Behavioral task
behavioral1
Sample
1960-68-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1960-68-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
1960-68-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
cb9fa49bea5b0b4bef2480c3f1e25e41
-
SHA1
1902020414391f3db7dbb97c9f8b1b973f3af1b8
-
SHA256
e78faeda9bb30e087d8de1090ddbccd0ef1217611b59e1210a3d9268b2e107a2
-
SHA512
6b72fcfffe2aefed294e2636fb6817d3106a857e71d8d033961a55ed8f1f7c283a8fdc53e320c8dc471a90b3e1f55f72fe1349b2f2f76bb8e073f16eb1fceec0
-
SSDEEP
3072:PEmFa3+IK1FmWSp198KInCLf6dRbKlfH0BnP:34cJa1eKMdAZ0VP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.businesssolutionstraining.com - Port:
587 - Username:
[email protected] - Password:
2ManyCharacters! - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1960-68-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1960-68-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ