Behavioral task
behavioral1
Sample
600-136-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
600-136-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
600-136-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
8b254bff67a0bc5ae59fa7a9e6e2d0d9
-
SHA1
23917355c5ea62f017090c925f1709a7ecef772c
-
SHA256
178c4404f6a9b1071857663a27c8980d6d358bad549560e7b5703971068379d9
-
SHA512
203acaa510e94fb5b0d9dacc5e5895cb543a76b481282ae71b832def882a3acdda9f4acd6bde179dc2f6cf9ccde18ad5dda587a3edd4f3a94d35c21fdb0368f8
-
SSDEEP
3072:zcXgetuQ/HY2A8JQKPm74nX4UqRmckQlNK6vm:ytdHY2A8J7hX/qRmcNNK
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aksumer.com - Port:
587 - Username:
[email protected] - Password:
BMb*9632 - Email To:
[email protected]
Signatures
-
AgentTeslaV4 1 IoCs
resource yara_rule sample AgentTeslaV4 -
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 600-136-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
600-136-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ