Behavioral task
behavioral1
Sample
2748-19-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2748-19-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20231127-en
General
-
Target
2748-19-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
d6f71198b0ad4ae9d36a7076adb7ccfb
-
SHA1
ea60bc97de96cd42e977e071365a9f04e4fe0c9f
-
SHA256
ad2f799d3543f734f54ed21e69e1c2b3cf02bf3d8086d11688e6e23f14f5e6f1
-
SHA512
57c4f4fad9785036aa1313e21b16ace5a49660f1e7a2d4bc32dbd4b3f421ea328eb0b9c1a6ce79bf4f63cdd639ae3f48ed996104fc989bef03778eb097031194
-
SSDEEP
3072:hRLthI8vGy3tW6le/CPdbadcVrkiEXfwl59Q8kfell:hRLthI8vGy3tW6leqbVbEXf58ka
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hltllc.com - Port:
587 - Username:
[email protected] - Password:
Hlt@36@Gr#8 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2748-19-0x0000000000400000-0x0000000000440000-memory.dmp
Files
-
2748-19-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ