Behavioral task
behavioral1
Sample
1116-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1116-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
1116-13-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
6205cf57a4069520ac998cd8ef9cad03
-
SHA1
f3d883e10dc4cbf1af16294d4c692fd960685335
-
SHA256
cc492c99eaa52e8f539410dd4be28e3c69094684b821f50f1614d15739cf5ced
-
SHA512
a5c2b6e56c6880434acdd56dedbb6cd1ed117fe909247d2c5fd283af7b870f3b2c7a87e4062800739fe80bf603832e3be546d58d2b2fac7552fba261c24db369
-
SSDEEP
3072:hqieOOeuDcZaop2xFl9CyyomQ8o5hL+mtzMcOI:hqieOOeuDcZxp2rGyfmQ8e+mt
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1183507859548409966/DLogPQ-F1DDyhyB8jQQaZyMMcOMnZXZGJcy3aRzF-4v3ffTI5rw5BJsXH-q9dmg6WDRG
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1116-13-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1116-13-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ