Behavioral task
behavioral1
Sample
2100-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2100-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231025-en
General
-
Target
2100-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
8627c10db3704281fbe9a0e20823f3d5
-
SHA1
07fdab0300936179e159a8367c40ef9392f4da55
-
SHA256
a0c633cc9c4f7fc7271ecea480b0efbb3a04bf1d927f14f7b45a36ede0b86722
-
SHA512
240b27f52b37e670924f2fc7ba5ee730aa85e9e7912512a579cb51c208fcb8161e8c5ca87c092de365074208d5fa3615799011723a3594cf505f536cd5472b9b
-
SSDEEP
3072:CE8xmmeeWGkZYZuzjDeLVm4wyIZ5Ovgf8S:CE8xmmeeWGkZYZunSLVmeI3fn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
merajlimited.com - Port:
587 - Username:
[email protected] - Password:
Pa$$word786 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2100-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2100-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ