Behavioral task
behavioral1
Sample
2848-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2848-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2848-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
eb6cd0d1ba57e5fa0b5e8ccc5e0ae218
-
SHA1
6e0a8dffea0565e1fa6a9f7c0396efb7ce997af6
-
SHA256
129d2ac411e90a57afe72210907660952ac82bda5a12a0c1b09ccd51e034354c
-
SHA512
d8e9d1d6a4f8d2cbf4c5f75c47a20d9c8c6c0424e845af946a01eceb3d67d6f09d3632fac85f2f2e546b9d6977e8c08d72adddf03ad7deb98403b14dbad2b68a
-
SSDEEP
3072:bB5HO+eOeimrIMpZh8ndzGkylEa1emSo5SMhWlp1U/VD8:bB5HO+eOeimrIMpZSdzGRqseVVplp6
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1160553173312884766/yq-RlxEXzFKHo2Wd72IKpibm1nvN9oQfhLpuikiTduc3vdFItjEixAkw3m026nobdVZ9
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2848-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2848-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ