Behavioral task
behavioral1
Sample
1608-87-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1608-87-0x0000000000400000-0x0000000000448000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1608-87-0x0000000000400000-0x0000000000448000-memory.dmp
-
Size
288KB
-
MD5
64f1c2769636ca44cf21753b9ae5abba
-
SHA1
adc9496729d256e0da94d7e3004caf66519c4c77
-
SHA256
137b80ddc475adf6307bb5545c3ffa7d39859182bfb265d7ca7e3ab054a78b66
-
SHA512
46b75b165e4383f9b340ebf24450291dd4b3094f934350964b2ddd5411bd5e2801615a05278125a164f1dbda658766ced2b82617bb6c4f5a4804b96e608cb48c
-
SSDEEP
3072:AYgAamSa//pSB8ukCRR7sPzB9T2dWvb95QFj+pNwt:AYg8SagBf6OADyynO
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1103875906361118810/4y7iINqCCd1vB_5CHVi8bfs-VsURmj2vh2ZdBw9vV7iC_QaLM-Uzs73INWoN8KSw28mH
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1608-87-0x0000000000400000-0x0000000000448000-memory.dmp
Files
-
1608-87-0x0000000000400000-0x0000000000448000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ