Behavioral task
behavioral1
Sample
2648-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2648-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2648-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
04652c5cd669e3a8ddcfa4018ee47cfd
-
SHA1
25c237a56d088833050533df74ccb6e5027354cf
-
SHA256
40e7d54ac5782599d06ac6a752a1ef7ea7e7a447ef642a555198dd9c80b005b9
-
SHA512
32f1d0ae35b675ba61fe19bf3176e8ae6dde6d9872bca7d295e5770c3696801a31cfbf4e222a2fe35bfd4ba95a1474f3dc88ef2cb102813c4cbb806343642b64
-
SSDEEP
3072:AG7HIq1I0AVlr6HRRbwuD57GZUdpij9XlZq1:n6Vlr6Xbww7GGps9XG1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
111aaa@@@ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2648-9-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2648-9-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ