Behavioral task
behavioral1
Sample
2064-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2064-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
2064-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
8c6257c70594dbc84abaf42ba9d8320b
-
SHA1
3149c722e368d0d176251a639d3b93196f12a7d8
-
SHA256
cbf4b3016b40960c68dd4fa6baf9cc70b6bec3e077e89479ebfa980e04373280
-
SHA512
5c5c54f688a628677cc2cb51191df440a3f12c12dde8ed599d51a4fc348edece3a05de2fafb5f598881eaf448035029686e48a16137f8e25af7fdd2eda0823eb
-
SSDEEP
3072:poymieCUvaThwbV9H4Pwfivt6p5NMZLJ:poymieCUvaThwbV9Tqvt6aZl
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
YAWALESS123@@kkk - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2064-9-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2064-9-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ