Behavioral task
behavioral1
Sample
2092-1155-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2092-1155-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2092-1155-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
f36523c16b866c389e127d0217ad8e81
-
SHA1
caa662d79fc6e96a1d91ba815ca90abb4f900b56
-
SHA256
98bedce90d09ba4984df4354977d202147c08461568db7a1719908100323caf4
-
SHA512
e4ec222a0530bf21e02432265f90065ac8448f15bf0c6b6790f55079ba84666720d181c35957b47949f543d9a4b1b5d3bf56b871eaf1dad3436e2245e7249576
-
SSDEEP
3072:inSpAQUWhrabSdpyJ/w+fwyjdnoDzFqKJbLVY86eJY0t:inSp13d2/w+fwOn5KZLyeJ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
TUKTUK55@@<<! - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2092-1155-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
2092-1155-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ