Behavioral task
behavioral1
Sample
1492-12-0x0000000006CF0000-0x0000000006D30000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1492-12-0x0000000006CF0000-0x0000000006D30000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1492-12-0x0000000006CF0000-0x0000000006D30000-memory.dmp
-
Size
256KB
-
MD5
678f2703ffc7a5cb40ceb955c5f1d35e
-
SHA1
46f0858b80d463d1da77a2c10749457341e25c9c
-
SHA256
05fc6928ec89fa3f2a0abb43a1a71136039750a3e0711342271c1d9a901fc0a1
-
SHA512
919649e467b545bc9412b4daa955ee4be57aea367983de4e57a769518202d3a4d49f740208c60b8099d4726567de4180ecfce33aac3983266627cbab1ed00b01
-
SSDEEP
3072:nTymieCSw/8BJGbJ1Qa8Ijd0c54CeixUO:TymieCSw/8BJGbAa8qd0Xiq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tecnosilos.com.py - Port:
587 - Username:
[email protected] - Password:
w%$?KBU*]N^P - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1492-12-0x0000000006CF0000-0x0000000006D30000-memory.dmp
Files
-
1492-12-0x0000000006CF0000-0x0000000006D30000-memory.dmp.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ