Behavioral task
behavioral1
Sample
2904-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
2904-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2904-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
271d39ae4c1accab0241508b3b094a61
-
SHA1
25ffd1659ce2a5d944d81d67f024bb3ab214e3aa
-
SHA256
382b32a91275d2cecbe1de58b1feb4999993973554c9df13159ea10d97f0d988
-
SHA512
e39d33bafb347e75dd60b6acb9fc375d366d8c8035c3fe4d24af12ee65519967cb563decd570624c2a76ed822c53b339e9730cb6dd70c5603bd32546f0210569
-
SSDEEP
3072:DUtxa8VEiZmmxewL/0JuVWY5I2F8cRiGjrPrH:0nEmxewL/QqI2F8zGb
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1139484107194249226/Vlhp6hn2jQbp2Pn9C7HitXwMubSUxt8jvVmjiMzLvA0UTXInxNbf6E9L7WA2v5GWOb49
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2904-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2904-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ