Behavioral task
behavioral1
Sample
8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f.exe
Resource
win10v2004-20231215-en
General
-
Target
8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f
-
Size
243KB
-
MD5
d00d4b1942e4fddcc7aa2615fa04918f
-
SHA1
6b16839554d339ac8271a9c43abf90c958ea448d
-
SHA256
8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f
-
SHA512
5462266daf3634a7f21f4b7bbd48d3759995a9dd73bc8224b7614264c32820868257435986c92d78d064caccb005b4a9b1428ee84a7c12b5194884b70e00e61a
-
SSDEEP
3072:DLrOBNkY+ZNjHDXWozVkFc4n+3zz2jd+57S5pNC3FAqu:fYkrZNjHDXWoxkhnozEs7Sg3Kq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mymobileorder.com - Port:
587 - Username:
[email protected] - Password:
Grace@20233 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f
Files
-
8b82d6753371cb615665162dd514d1cddb539258b4a7fde1a4443a2e2e03c86f.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 240KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ