Behavioral task
behavioral1
Sample
db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42.exe
Resource
win10v2004-20230220-en
General
-
Target
db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42.exe
-
Size
164KB
-
MD5
c45beda3a101be6107772e098234eb3e
-
SHA1
e7a5a3ee509fb12f285dcc284a7ff1b50d3ae05f
-
SHA256
db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42
-
SHA512
cfb1a39d8540439cb5e90acea412f20cff37e5b938eb8154dff5d62a3f44192798210204e084d6dcab9293366af3d4586be47f09112b55158a45bf6620c5384a
-
SSDEEP
3072:3kxWSGcJKcSpmHsRn7jtvaU0JrX1p2zxAIVWZDgwG0V5Lp2:3kzJKxQsR7jtx0Jp0RoZ6CZp
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6059715313:AAFjM24na0-uklgE9ypjYrFH9aLhVYtkWW4/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42.exe
Files
-
db03d92258b91219363c636de58a607ef0f1346c6486f866e3500bfe24c85b42.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ