Behavioral task
behavioral1
Sample
2180-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2180-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2180-14-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
43f85b6a2f548f0a9fd26a4f4db640c5
-
SHA1
fe2557b5c0caadca2ba9e17f0c63c82336d0bf61
-
SHA256
527a8d47bb9dcdcc79b65ce54d6429a0294b1ea14768854db105db6ccd223edc
-
SHA512
8f0c98b9c4b3006c3199e1b0d39bccbf5d10473683ef3dd2052a361d0218086bba1d4da92d3745a663aae1038f09bf796e08872a536fed6329a7d8a9f6b453f9
-
SSDEEP
3072:qr3DXbTaieymvqfN0Pu3c1DqTQ6nQ5+meYAxXLUOE/y:qr3DXbuLlGcwQ6nHtYAd
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1202330946817237022/1d5Ynow6yHbMqcRfr75qQjJVcSQnFlKpV4g5H2hHiKoRW33XeyZHnl-7hxdTf95oiy9f
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2180-14-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2180-14-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ