Behavioral task
behavioral1
Sample
2360-57-0x0000000000090000-0x00000000000C0000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2360-57-0x0000000000090000-0x00000000000C0000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2360-57-0x0000000000090000-0x00000000000C0000-memory.dmp
-
Size
192KB
-
MD5
ca95886e8fb093aa585d9ce8f0915c90
-
SHA1
c202596c05324175b983677c7f670ff725acccf3
-
SHA256
a1f381040b311ca936a3bd9757ecb27b4ac1caf42470406a7253a35130a07559
-
SHA512
4e31cf02e930b3b9ff7aa3d90537d20d3fd2b26b90efa72d043392c0aabb652fa2b2d8b6cdaaefed8cd71ce71193930894c68e17360a0374c1196825e4312028
-
SSDEEP
3072:AOH1syBEFoH3BV31+XBHTutvnfVsUEAPA3vqFAAVrOFL:t/moH3B9tu2lrS
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.maleksalame.com - Port:
587 - Username:
[email protected] - Password:
cynthiams@2211 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2360-57-0x0000000000090000-0x00000000000C0000-memory.dmp
Files
-
2360-57-0x0000000000090000-0x00000000000C0000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ