Behavioral task
behavioral1
Sample
1408-166-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1408-166-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1408-166-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
50896d2821ead8feab367a87767cd1b2
-
SHA1
70bc44835f42f6d2467ac2d1c8be8984003d35b2
-
SHA256
df62d2e86bdfae168953a23a63fcc762a66df3c37b25fec6692760ac9a2ca587
-
SHA512
ed6d4187bcf7379ffa7f2a3c457100557cec262f5b6676928e6bc5df16ee82ad8c36d8817a86ed210d72457ec8addcc5766e28db17ca8691b296fb6bc0687a51
-
SSDEEP
3072:d7dlkVQZLcPw5cnNkc6Hp9/cg+SMt4NTy8z3PAG8:d7dxJcFNkc6J9Eg+CN3z3oG
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6125345128:AAELaNDC6VdQQywdvqd5w8Ps_ZT19OAINe8/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1408-166-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1408-166-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ