Behavioral task
behavioral1
Sample
884-62-0x0000000004DB0000-0x0000000004DE0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
884-62-0x0000000004DB0000-0x0000000004DE0000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
884-62-0x0000000004DB0000-0x0000000004DE0000-memory.dmp
-
Size
192KB
-
MD5
517b140bee01253a918779a10b021d8a
-
SHA1
fbe9ec4b73426794487e935ae72a3501f415cfd3
-
SHA256
c3b024d3042fe99d274cf30468d0a0b4933f7de4f00cf3004934b6620c3aeefe
-
SHA512
d98e64e4f254d4eb4c2f02e647c034b83558d91ad1f05b91b88f9ad93fec1c58d63c1bf85314602e975f1f4cbf62f2230c043216fd82fbc6a06ed2a7a56497d2
-
SSDEEP
3072:xQSQj10qnA82drdfgGzCK/4k/J2AaFAfHpu6mFHEVfH1VUUUUVmgQS6XdQPooMyT:xbQjSqnAjdrdfgICIx2uxysQoPdwwZ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.com - Port:
587 - Username:
[email protected] - Password:
goodGod2023? - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 884-62-0x0000000004DB0000-0x0000000004DE0000-memory.dmp
Files
-
884-62-0x0000000004DB0000-0x0000000004DE0000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ