Behavioral task
behavioral1
Sample
2668-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2668-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2668-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
9cf300b9b67a14e3f2282730cebef43d
-
SHA1
fc9c36f942344d312cd527869d8c30c531ae7fb1
-
SHA256
6342aabce3668be59635633ccd75326e700ab67873e753d6d6de5e971ede627a
-
SHA512
6d4322c755c52bd24e5efdff2adee9b5d6a75fa46f3c4361aa9ee9f68046246297af46cf1389c9f70d011ad7f5e89fbe03562d6e310ceb71e14c6a105b2ce711
-
SSDEEP
3072:wCJpeO+eOfBp8rtpTHOc5JVWY30HDqFUjqRd5zsyutdIj9R:wCJpeO+eOfBp8rtpTu2cGFUjqRgyuT
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1177188919264165898/4kl2v0wvJ9yNFVjwO7OT82qwv_LhC2zK_vNKg9hvPWNj7tI26cZuPW6CMUfb74KAR8Jp
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2668-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2668-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ