Behavioral task
behavioral1
Sample
1648-65-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1648-65-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1648-65-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
7ffe0308cc0049462128adbfffd71ed6
-
SHA1
31d42528b4aebea4fd58997cc405489d4a3d33e6
-
SHA256
3984d336c76af6e50f56b377390a867a114a9208c0506fc2c17f49276b2f3d73
-
SHA512
b5cc6721beefc7e5fc5418d4bf35eac5f65559d8c1c6ffd34b239ef4c603939852fb6981f7aa78455be7da03f5139fa845f10ca03d6b2c66ec78a61ac2be5024
-
SSDEEP
6144:iDthOzj8mzKQCmwqBbvBhQ6oubr+SxlGxA:iJkzQmwqZvDJbrTI
Malware Config
Signatures
-
Agenttesla family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1648-65-0x0000000000400000-0x0000000000444000-memory.dmp
Files
-
1648-65-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 119KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE