Behavioral task
behavioral1
Sample
1872-65-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1872-65-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
1872-65-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
MD5
95d649292e2cd4ff5e30d45f96b4d16b
-
SHA1
b19d8c2d36bab42e387c71c46f3e24d9376479a0
-
SHA256
52b66f16b360cdc2a4c0afec0123f3e99071d1ef019216b48b12281076dc09c5
-
SHA512
cfdf2533e43a0602cf616aab8e09e44718ce3c984c6ce07eb1d959bc74ccfa5a02e31101c01d763065484f8bf0d86ac9b37d54456f44124cfc71b7989a6be78f
-
SSDEEP
6144:ukaZunWu0i8GkXHjd9yVwI+oT67QB5QIZLzOi0ctbQGW34b5VPhBBxaDp8:vN0i8Gk8OM8Dp8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.mdist.us - Port:
587 - Username:
[email protected] - Password:
yanin#4321 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1872-65-0x0000000000400000-0x000000000045E000-memory.dmp
Files
-
1872-65-0x0000000000400000-0x000000000045E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ