Behavioral task
behavioral1
Sample
2440-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2440-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2440-13-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
f0949beb5a6bdb3e3ba621bf5de7db93
-
SHA1
97d944da82329ddec61a759ff2df7e49e9ca0aa9
-
SHA256
27775530ed40cd539908c1200106fca91c4bdda375d11d228621795a352d92f7
-
SHA512
8b7d8b192f4858ea6ebaf2127c9c799386495f8b5dab122719b6f0d142e1dc7f1907870fe895ee4a3a264e7e28c3e01e1301a0cf24bdcd46af873cd7f349006d
-
SSDEEP
1536:9ZwicuUfpKzwccmMt/vwy/VbRlT2tCPpbrqPqZ9Nxc7UBSRuIb45oQJVp1mbMU4D:9Z4zrm85NbvTnbOPqZVoUoDb8JVmwUE
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1154523392905597018/wzBAFbtVwOdyKBTS0y755dcYsNn-l_t7Hd0vNwAY-Jx-HbnT8xXro6ySqKFDlipKQwP9
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2440-13-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2440-13-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ