Behavioral task
behavioral1
Sample
1756-77-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1756-77-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1756-77-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
2567c907a4f46ba130a66e34d90311d3
-
SHA1
b5329588cace4a84de0007c13d05771781ae81ad
-
SHA256
fe12dc935e5f426e9cd72620eec9e1813738e9ce93f1cd2e1babef765a9e61ac
-
SHA512
47c9ea62576a1f6f38ea6c4cab9a7dfe6b5299f0ded0a67e2c333c2d251dc7959366553a83e907b97b408904b9ad19a5f42a2145cdb162d011d149bf640d03ad
-
SSDEEP
3072:K+WPggFpiyEq1mXgBHuwEm9PhSv5Vc6m9ecSXWje7O:2fLDFB79Mv5DcSXWC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asuoniatools.com - Port:
587 - Username:
[email protected] - Password:
locowise12345 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1756-77-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1756-77-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ