Behavioral task
behavioral1
Sample
1696-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1696-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
1696-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
75f12184c55d668e9f2b014140b763da
-
SHA1
f25b3c88c2c09c429a6b44e4bac267a887859b60
-
SHA256
33a101d1a60eb8e3199056e90b4d78a044cc7e5f5aafca38b7e620a69a1c3f7f
-
SHA512
2907ec3702674e72a4c6a8db4e8663402fa2322f2dd2111354745142d04a5c37eee1dcabd44f0bea4cbf2b2a56a8c5038ae7a1fe6a73f46f7362dbcc46174c74
-
SSDEEP
3072:wCJpeO+eOfBp8rtpTHOc5JVWY30HDqFUjqRd5zsyutdIj9RT:wCJpeO+eOfBp8rtpTu2cGFUjqRgyuT
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1177188919264165898/4kl2v0wvJ9yNFVjwO7OT82qwv_LhC2zK_vNKg9hvPWNj7tI26cZuPW6CMUfb74KAR8Jp
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1696-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1696-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ