Behavioral task
behavioral1
Sample
2680-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2680-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
2680-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
c58f47ddaccaa70a40ced82739f88e62
-
SHA1
ad923f823e2153d92b88000794af05eca08f9d5b
-
SHA256
f49200b1fda4c0ba08a35a56d11095b4ea772bdbd2e90a6de714a910ba7ec454
-
SHA512
631566525c2a8c154fa5c683eb4b4d631b23988c1aaa549a085c4a3bbd6c89b3363ff379b36eda7ac7e15932c894786ad0a7e6000fc48d0097b67d66e9373272
-
SSDEEP
3072:UNQkgcAk+RBWtv1hwfPkDcttVMuopbVdq5LFC9bXtM:aQkgcAk+RBIvzwfPkDctsuo1Vd/9rt
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rolexlogisticsservice.com - Port:
587 - Username:
[email protected] - Password:
Mc;NUa%u+yF. - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2680-11-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2680-11-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ