Behavioral task
behavioral1
Sample
2700-31-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2700-31-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2700-31-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
d71045db1c605ed7e2f2a50fe9b56432
-
SHA1
7590f1e99b222292fbe0c720da75fe6e059fc0aa
-
SHA256
d00561925d4eef57d801a2ee6fa5a72421e719dbb572be2c2c88976d91dc7abb
-
SHA512
a8b21f442a046e1be7a70e312d88b5ec82213345813b73811af7ca268f3361b5bf6b870b250aa7f013a9b1b33ad3ca030120a17b2eb51989e2b8a4a3735440f6
-
SSDEEP
3072:NdryKy6yk+fDiQdbFKaBbQXpgaw0S8Wh55HqUyUE2C:NdryKy6yk+ri8NbkpM0rs2UyR
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mcmkimya.com - Port:
587 - Username:
[email protected] - Password:
uTGf2VS2YdbYfGqJLRpy - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2700-31-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2700-31-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ