Behavioral task
behavioral1
Sample
2436-8-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2436-8-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
2436-8-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
edb12a0a4d59c6a59713f3d7c0e2c07e
-
SHA1
6c68d77664bab4bf317a1e3ae6c1dae6821b5020
-
SHA256
1df8c20fdbf21e8cbdf4aab99efa3ffe28e1e7a44b50dd81a4c241865180b946
-
SHA512
dec4dd6a09ca926996a6f04af05396b0cd64cf41a82ea33822fd1f4cc63f7e397dca8e05a500df472e27a5d27dbbd414478b00fc51a4654a4794d5b50a78fd1a
-
SSDEEP
3072:v9dVjAjVd1tFylKb0kfCsXv3OGhO6WXD5m3recgrnf1eTG:v9duVd1tF70dtMO6WXCecEn
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1183413987946274836/x2mGL5RsDliW33UcztWPXWKu2_GrASEJKuUh8AEd9kIV3tIOo9lsaMizqXjKhhr_O01m
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2436-8-0x0000000000400000-0x0000000000444000-memory.dmp
Files
-
2436-8-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ