Behavioral task
behavioral1
Sample
2052-94-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2052-94-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2052-94-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
e4b113f17f748751a03462f2fac1b417
-
SHA1
3d78a5c999ee84b6dae69cb8e60bf4c5b9393719
-
SHA256
0a86414d87450033828a43c81825be8aca9c89a8f55b01832b95d3a4264f253c
-
SHA512
987a255404d722cec04b3074796dc61a52524c59b432b18da70f9ea65c3d36c7cc2ea2c54fce1324aece28268067e84431c4dcb82d130148d887374c418473e3
-
SSDEEP
3072:lfb3DXr2lZOXQwk0e1aXf0UtJhqHoe/H5I0hO5cjZeWprzY2:1b3DXr236zLJkoe/7hO5cjo
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1206393671298060309/FVITE1Nls_cASML7RoPv9wXcyXBuUk2YTXZCQhiJMOm7SGNvjRM6I2CWP6vhg5ft-g5H
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2052-94-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2052-94-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ