Behavioral task
behavioral1
Sample
568-114-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
568-114-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
568-114-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
31274c725fba61db03856aff76cbd109
-
SHA1
1b67b53f5cf9fbb9625c0ac97535e0809cd1d1b4
-
SHA256
36a7b0ac94164b5b7477432f668bf705cb434060164a6952f36b6c46f368c47c
-
SHA512
e7ec00c611b186d4238f1d9ed6fbb97b2a713febc4dc3b94517eda3b8edc509ea0422bc7b9d0594757cc27786beffed3b3b914943087984f7702d2afb5b7aad7
-
SSDEEP
3072:hD/dff9fjThdb/JgjtT1MdFBwpLT+n8LUux2:bfFjThdb/Jq54BcT+CUu
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
Vuq,nZwtwjpL - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 568-114-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
568-114-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ