Behavioral task
behavioral1
Sample
1068-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1068-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1068-12-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
f87732a004c1ac6e9066281cc54d3d07
-
SHA1
18fbf5c2ac8770e5749c9e6a578080244b13f962
-
SHA256
33c9fb6660114407a0c09488fae766b83a1a5af44dcc797167c99178abcc5229
-
SHA512
c623e7a5fc8af59304f19947649e3cc064bc9f40bdb4aa461007ba4a0753d19c42df54c968d59a66a66ef2cca09fc545988fba69bd66b4697fec7f714a679427
-
SSDEEP
3072:Zw6r6AvHS4+l5bm8pVxewH9w8rfluOE8idmwJ5ch:Z3r6aHc5bm8pVNeeEPmwU
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1155632175954280508/UJAHnim5EEI9C_FOdMt75WQIx-LpUygiYRchNShhIadpLPi-9bmzOnR0zzqjFcqt2OV4
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1068-12-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1068-12-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ