Behavioral task
behavioral1
Sample
1208-6-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1208-6-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1208-6-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
4cf73330422cbb41902b87bccb5a7bee
-
SHA1
8b2561ddbbdd318f2453ae819cd0dbaf0bfd26de
-
SHA256
f3b03a177b634a169da45f82cedcfca2cdb86217c7788f28e602ac508a413bf3
-
SHA512
5e66eaf75c728c7fd39e6e029115fe6ee36be510deed84715532fd797754db7e72bdad37438a2c88147455b5c839d5fd0afbb7382e19a7460327b903cd453d5f
-
SSDEEP
3072:9LVD1J2P261lj8/Zj7SUxoUpbchxUrXPGlpKkmb3L1:9L8P9lESsoRhjINr
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1887454391:AAEO-M9D-t5rRvqqeYNx5T_JO_S6Zp6FZaI/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1208-6-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1208-6-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ