Behavioral task
behavioral1
Sample
3372-140-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3372-140-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
3372-140-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
65c7f5e1462caecd805dff6cb62f87ad
-
SHA1
f24dab3e1c47194eb2d458052a2a4d8199d57fab
-
SHA256
2cb181533a1942d187c662b890976920ec837a1c92b399be2dd5ebd77bc8b813
-
SHA512
2fbffab99f97b917cf737628b125e1584d8ad90efb141ce920e8fe9fa22bbe63358b44bb0edd84a1ac6795ee2f19665d699ef4d5074298ac04b473ff75baceb5
-
SSDEEP
3072:StcRfabjbhV1xXqev4EBO/26ffgQoMgHUQursAFwcG/iezy:St1bjtHxq3EO2KgXUBJyrJz
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1105328307010015232/y3JHG4bp0jeynHE4DQgvB8OX8QijYxrk2CH91SY0HvNfeBptAktLBqo7Ix-7GllXk9Gz
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3372-140-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
3372-140-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ