Behavioral task
behavioral1
Sample
1952-185-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1952-185-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1952-185-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
b5951e5eb7c6c49886600e454014203d
-
SHA1
44ca01cbf41d50600f5e7beb753e1f217e4cca09
-
SHA256
ccbbdb5f3bac54631b7fa1cfbc5eaf05ce8c71c20b8c7f43df62c35bc478c2df
-
SHA512
26914c3096d9e20af430be95f6f87ff942fc2f35881219047fedb04c6f65b50acae7827f16cc86dd52c193061f24763c78165aea3ff4779f7ea113c8b0504263
-
SSDEEP
3072:e1L3zaOI5LYs+mwf7ueE+jW4fEWueuXGTY725bM3+v:LHFd+mwf7uUy9uK25bM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail9050.maychuemail.com - Port:
587 - Username:
[email protected] - Password:
1235qwer!@ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1952-185-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1952-185-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ