Behavioral task
behavioral1
Sample
1164-78-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1164-78-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1164-78-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
94efa0fbd923221775202be9ace1cf11
-
SHA1
032953e9f7780fa5c109a02301777a47c5cd5a14
-
SHA256
1d26f79f096c7b7a91b96500607062f4c3520e510dc1401867cb8081e577ae67
-
SHA512
be176e295ec2c0a08c11f9b2f67a30073200ddcf7757e83b9af0c1449ffac0c7b7d7cef806add2096b3ca3041d9635c751ad8e062bd57f3cdd5d49dde594fafd
-
SSDEEP
3072:hBGybM97hOQ/iK2jrOyips/XbKjv0k8IDEq2c0fyG5ra+1VNp2h+Q1dV/giiI5b2:6DthOzj8szKQkz6bVNkdvYpVw
Malware Config
Signatures
-
Agenttesla family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1164-78-0x0000000000400000-0x0000000000444000-memory.dmp
Files
-
1164-78-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 118KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE