Behavioral task
behavioral1
Sample
2904-122-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2904-122-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2904-122-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
3c4ebd3c01157bfcf0a08165d7ed9558
-
SHA1
938e86967208a4197a473a31a8725074303bc6fd
-
SHA256
2f40fa98e98932f72e3f33e3bb176afa275779e3f382911cdb2570ce954ec562
-
SHA512
491ff272c70dfd0604412d7d007c29c1c79d03673f4cc4ce57531440030d211fc2506a71ca8af9de48e902e3051f2de472e096327ceb976f34761898904ff885
-
SSDEEP
3072:6XlpL8Q2A7o+LLy1M77H7Z4/7f8o/vqVR1KqHVp6:6Lv2A7o+gMH94DkoKVvd1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
DreamChaser101 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2904-122-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
2904-122-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ