Behavioral task
behavioral1
Sample
1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1_JC.exe
-
Size
237KB
-
MD5
d60a27f84140ad7288e31362502fa01b
-
SHA1
7127a54ae782b69d17b8484196e1cd104b3a26c0
-
SHA256
1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1
-
SHA512
d3431ae1b5b7265c85472951cd75d6b8b2990fbf750ec016a3c1c8af3a8324ddc4ca24d1b7042e76b41e5f9b5905c97c2d504fc963dfa51e3c22dd57bba8eb48
-
SSDEEP
3072:6SsmUOI89DLL6lCZUe9gVAI0ZskVaKsH:6qUOI89vL6lCSe9KAI0XMK
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6255881555:AAHOVCQj06DgoOJk9JiQsjqRuYgxGNjmGxM/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1_JC.exe
Files
-
1fa2287bc930544bba8264dbf7b4efbeeb8cf730496c3145886f2559e0da27d1_JC.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ