Behavioral task
behavioral1
Sample
920-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
920-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
920-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
e53b0688b7eea6758eb89119de3e1519
-
SHA1
78a884b8d1bb79059975b2dfb81952d0758bc30f
-
SHA256
be1994eef1efd2d73ac2b124667fe8235231ebf0aedb85b2818ea6b51e28a064
-
SHA512
7ba459d3aa3e43bedcc421c106de1277c0ea2fbfcdedd16c3d0e5906f07009c6c17071ad2f62045bd7c7617345c55f1eb5305d40a02959fc8161962390e38117
-
SSDEEP
3072:1HrMYE48tVeTuaRrTOoYqMAJY8cwf5mHLNqJHS:1LMYE48tVey+LYqv5cwArNY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nogamobilya.com - Port:
587 - Username:
[email protected] - Password:
121121.1.noga! - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 920-10-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
920-10-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ