Behavioral task
behavioral1
Sample
32-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
32-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
32-14-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
bce506538496027bc9c601f8726fe9a4
-
SHA1
d0a4c6859db55a4adfacd4f7e6d24af05c27ce15
-
SHA256
57239a8affe203960ccb12202b539bd8654773694cd6c815a94fa554b1a3ada2
-
SHA512
baf64bfbe2f1b074d0c084947c3f0c1563d84bfa2a8202108c55f1085e38349820e8385f862d96cd8cf7e715b3c987467efdbe78095e0a0b6a0dfe72295d510e
-
SSDEEP
3072:HjeueuuYHwbvpmu/bNDgg+M6cu5cZXUPJTgVrWB:HjeueuuYHw7pm2bNl6cdRUPF
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1176429134898020432/cPdjbD_Jd6tHuXHaAcUkw8Ux2HgFm62NqS6ypJrgGOfLFFHLCw7nHGxroy1KhvCf5Kj5
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32-14-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
32-14-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ