Behavioral task
behavioral1
Sample
1676-74-0x0000000004AD0000-0x0000000004B10000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1676-74-0x0000000004AD0000-0x0000000004B10000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1676-74-0x0000000004AD0000-0x0000000004B10000-memory.dmp
-
Size
256KB
-
MD5
cd829770c90fa514e667939ef6f6e5aa
-
SHA1
6710e895846afdd3299f87d437eaae9048c11e24
-
SHA256
79a93c33c696c847709fcbafa4a0328881d4f2de0674f4ebbba7646742bc8324
-
SHA512
49d232c87d4f8634becb578b776e7a9f4b12e87e4a5b5c52d363c8a8b795a97f5043cd6dfb11e4470af332579a7dea49fcb65967e5506cb92ddeec473101034b
-
SSDEEP
3072:3D3tEKxxLZuuGRdUAjc2Y6+YaGKClh9Xg27:rxxLZu7UAjTb+DMlhy
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
method5000@ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1676-74-0x0000000004AD0000-0x0000000004B10000-memory.dmp
Files
-
1676-74-0x0000000004AD0000-0x0000000004B10000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ