Behavioral task
behavioral1
Sample
2720-14-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2720-14-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2720-14-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
dab2a761fa8fa21daa3389e69333c3b4
-
SHA1
308658a19b5c4bd758fb442b1d997b7c70c27f81
-
SHA256
b353faebea7d40fbac2a3a12461993afe50a1ba356b44f4bb73689417264997e
-
SHA512
3c1fd60a3b38a71f310840c2eb6924e58e4509cd7f9c3ecc1c9b334c08e78087f772d00d2846149b79e5f6ebfdb8e6980c6d72fd799709503eed24ad8c0db65c
-
SSDEEP
3072:yMHPLVMYOul2ynFkfosWxKVeV4iokPx+en1xxAR2E:Vqel2ynFARWxv4na+e3xA
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
godwillxzn.com - Port:
587 - Username:
[email protected] - Password:
Samar561984$ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2720-14-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
2720-14-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ