Behavioral task
behavioral1
Sample
2732-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2732-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2732-13-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
86996844adeb7b1f0878f2eb41c0cdb5
-
SHA1
2af6787afa084df8d8c4fa67518e5f11ff6afcbd
-
SHA256
4ea822eb04c6547a3d8765edb2a9be25cbc2aec9ad540b4de8455db9e3f8b2f5
-
SHA512
a25c6096e968ccb3f81326a8b4a4c134fc2fcba752868484ca6dd3e10fe811aed2f7cbe03ce71fcabf1ece62e33430a2f8f8e6c764c9acb4cd37737db723718f
-
SSDEEP
3072:+HzIAxYcg8ox9pnIo/t3oxg2qWYm/ll5xvUt6d1aAul:+HzIAxYcg8ox7Io13j7WVdpU4v
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1164100393261858867/G7RStJrYOObtmBvDoi3euMF70hRc-zX9Gqxk_D0HSERhOrddFPXoKKfkKdnJfhMgi9zl
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2732-13-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2732-13-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ