Behavioral task
behavioral1
Sample
2644-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2644-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2644-12-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
6ac9bdc737e034d3770c95423dd3ca8d
-
SHA1
9f2db136dac949401413df2a89c687ad857f4c77
-
SHA256
93d0ab5530c070dd7e1032fab86fd2437a508659170c558529f53072e4b13a0e
-
SHA512
70d388c17043b200125213508e66c99f54f48b5482deb6c5b0755c0eb8ee7b3f34f28f5bbb9f0d69392677b768336a65b01c92ce34596ef7504ff66df2c000cf
-
SSDEEP
6144:mx0cJ9xtZFq0FPUbl1oEmwyDPa5bt26w:uNJ9xtZFxFKPbU
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.barekatest.com - Port:
587 - Username:
[email protected] - Password:
EMvgP%E1 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2644-12-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2644-12-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ