Behavioral task
behavioral1
Sample
1084-88-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1084-88-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1084-88-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
a44561241904184329c3a0b1e8facb25
-
SHA1
67da109b3ecee2e0366c70500a80359a2b11a520
-
SHA256
139d4a5dc24e0b4322a6d703be3abaf5b5a5b65421863ea26efd39e4b40333f8
-
SHA512
92310a195457c07673a4e957acd3c1dc0768b526810a41372313b670f49da899665c30fffb42aeb72717dfef6a6c0a9c6465417d24a570031a752ea51cd93853
-
SSDEEP
3072:5MxAarnPuL8eHIXx3GohwP+7wOwpY0/DhbgmBKeGA:5MxAarnPuOX5GxUwpFDhbOe
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6381416776:AAGJkWrlSonqQPI9MEgZDaCvfd7LP-ED0lA/
Signatures
-
AgentTeslaV4 1 IoCs
resource yara_rule sample AgentTeslaV4 -
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1084-88-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1084-88-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ