Behavioral task
behavioral1
Sample
4640-1088-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4640-1088-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
4640-1088-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
e25dc01b75a64600e7f9791edbb3d9b4
-
SHA1
ec469f639dd3a4411e14aa42618abecc0425b9be
-
SHA256
5ffbfc169ffaed64fafa125c95402892b1b0f135d4d7c9a57323a4fdff3a2362
-
SHA512
6e6952166fef6d5edb0501f63e6167080c73970ed053fbf19106f469b298b3b66d6db07868350676ff36a230b56d05b12b32275becd5f4fa241f2056c8a8ae7b
-
SSDEEP
3072:IRnARSvZ71GoEQ7vyX/FkvYe39A45BpZ7r0OqxM:IFAEvZ7IoEQ7vcuvH5BpiO
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1146195046077571204/dpQlTA2RWqbwHpRhYenNuZ3tutnraFV-lblztGJAQxmKVrNquGOPF17NfgQ4II1PAilH
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4640-1088-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
4640-1088-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ