Behavioral task
behavioral1
Sample
392-13-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
392-13-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
392-13-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
3b38fb826aeabaafe7f2b9fc170b5ea0
-
SHA1
107c689d5b61cb27951c3428f4a60ac20f0a3caa
-
SHA256
f9fd1a5daa01d0d7a2c6747feb328633e600d1805d6eed6101a5817ac6ccaba4
-
SHA512
89799e9d164cfd23f516617f96cd9133975cc88413529573cd4ebe49f2b83c8cb8bc59d6234ce5b0c8dc9064c1ec2afd66bb852f705aee5b41d5ce5a407e8760
-
SSDEEP
3072:wYVL5rdvyIGY3dTR9G3N3CUsd4rowo1/OrHCInphGUkpgI:wk5vyhYnM3N3zsd4rBoqxpYg
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 392-13-0x0000000000400000-0x0000000000444000-memory.dmp
Files
-
392-13-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ