Behavioral task
behavioral1
Sample
240-68-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
240-68-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
240-68-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
fea5ef538ce89b6f2d41ae26bceae941
-
SHA1
4f5456f302bc3dd86837d2a0f97d3000f33f8ac0
-
SHA256
2ef28e3e212a4d65c43507dca65ebafc020a8cf26359aab85ebd7b9c9d7fa650
-
SHA512
7f3658880b839ec8ca6555435bc458e93dbf16995bb5b0b8be0f384f686f016bfa2f9c9e56cf22eb488ba1931a747f38a171980381ff01390d2033175e52962e
-
SSDEEP
3072:x/NJRTx26P1Kl1G2/0NmhLvMgnP2qlg8TTbjq:x/9cqO1GEhrBlTT3
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6284958682:AAFqhG3qHKFjAq48ezySmL8vRDzlw2Jx9s8/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 240-68-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
240-68-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ