Behavioral task
behavioral1
Sample
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.dmp
-
Size
264KB
-
MD5
c3a599dae02fd09c95c9cdb9bf104de4
-
SHA1
a10a5699b92a7e33232b7b3fa8bac65aa918f2ae
-
SHA256
4189945355a201fa49e9e7fde1a4c0d6ef0c4ac905bb08ded3efdd82675ad984
-
SHA512
bec3b4d5782ba6c7112d5afd69c1bcd753b090786546ed58ca269795c06dc93cb57c2222835487b82704f0a55678055f1c5ffac8c67d419ce363335156e04686
-
SSDEEP
3072:fmkphVxdIf+f1htg7aapRfokQXQ2zktFBE35wJvVl/tfuT2:fmk7VxdIf+rtg7JokQXQ2AtfPvVRT
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6381414841:AAFH0klFN21XG8PsAP5mFZBYcjb663pXP0E/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.dmp
Files
-
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ