Behavioral task
behavioral1
Sample
4048-10-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4048-10-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
4048-10-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
93c566b11e2c8f5602e8464d2ab3cc35
-
SHA1
691dd6e96995aa52c60b91cc62d8bb24d3cc8dcb
-
SHA256
23fa2d47b92efc11869b13e75344f83bfbcecd798b0632f26a3b4f5a69f4b8d1
-
SHA512
24bd68e90e87c322f8aabd1924b17ba462b5f64fc30d14c8bfc5cdfb587ba918284e877fb61d92cd4bd31cc9ca04b6ee3834ba00b70762604e1263d0591c11a4
-
SSDEEP
6144:p1K+d9qwJS3rpHua+EXR90ldyxM5HawuZK3ctPJ:CmBH2
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6555557349:AAFkOtBq4OuD_wA1LCGsyKMyb_dVQE4eedc/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4048-10-0x0000000000400000-0x0000000000444000-memory.dmp
Files
-
4048-10-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ