Behavioral task
behavioral1
Sample
2564-20-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2564-20-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2564-20-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
4f2f01005136e9f71d73edd659dde185
-
SHA1
f556507605d5973c2fa96a5a72dd0655d62e25c6
-
SHA256
00ba5e6229239087fdb1fdcf19d9404c4a748a66b360067527a11c849e549912
-
SHA512
f2277f65a0f8e3e9259ba1cd7aaff6b50968d5a921e46395de5c26b1fdf70afa79292d555f07b37e771c7c8ed2d1e257e5a256c056d2bc39d651d8a767371fc5
-
SSDEEP
3072:VuZUGfdE6AIYBooRLSl4U847KS5XMgpN5+NK:Vu7fdE6AHBDRIKvSdMyNa
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sirisexpress.com - Port:
587 - Username:
[email protected] - Password:
SirisEmails@123 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2564-20-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2564-20-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ