Behavioral task
behavioral1
Sample
1356-6-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1356-6-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1356-6-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
beeb37ed53cdec79556f49f672fc3822
-
SHA1
04e56192efcc90b85e7c41d1cea86bfdb3d6610f
-
SHA256
599263ef10ac63e735f76ce9184ebd65acff4c43d3ca42670c93a24c9211f572
-
SHA512
b789b1df3ca8636d59f1536259c93f6af3530ca2daf11f141a705995f1a03ff3316944452a99622570e609a8c286691ffc5ecbfd39c935bf136ccdb3b916a4d9
-
SSDEEP
3072:zMaTSjKGwrb8XsjGXldz9eBwbqczqGMaehU:waT/vrb8XsqldYMqkqy
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1151743910964625489/OTxrHUj4z0z7EdvsMCv8cUVw4Pj5qv9XnrWLQe0n6Z23jJyViEsxW5Q4xb6c-PRpBi8w
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1356-6-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1356-6-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ