Behavioral task
behavioral1
Sample
2092-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2092-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2092-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
ea17ea6a2ee21e80c0927952d56e73b4
-
SHA1
cebb3a6b0a2829bbeefd4ea0b9313f8d8fcecec5
-
SHA256
f3c02224a419e19dbca5276e1a1a79c84805fea23ba70478e6384996ab156333
-
SHA512
7c20c711db1729fc281d5bc87326dff798f3f9aeac7c80300621a054be02d02d8cfaad599de026551930b31e8cde4ea4d5451350173dc6c75bad6538fa76bf8c
-
SSDEEP
3072:WgXxtpdRzeGZ6Qhvmn4fT25MmjshF62A5qRyov5x:BXxtpdRKGZ6QhvmnCa5MvhM25yoBx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2092-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2092-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ