Behavioral task
behavioral1
Sample
1656-66-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1656-66-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
1656-66-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
e87514c8d00d0893971136953ada2e37
-
SHA1
ec9b6e8d8ea9a51b4466db8c34226f73dfe8350a
-
SHA256
c19393192302b2af9712f69cd69793109633bc64ef833223415249dbe8c483b8
-
SHA512
07f08bc6b19228a547a6129102733c68311690b2e2a10c73e9934f048d513096cdd9cb3211638ad3822fb1f78303fc3cbf3f4f814cd642542a0e1702e764afe5
-
SSDEEP
3072:nY4VHiV+Bwr5P5Yqc1qynC5QSoz5r+cKr9f+4RI1jwX:ny0wr5PGvqQGDo5+ce9N
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1656-66-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1656-66-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ