Behavioral task
behavioral1
Sample
2648-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2648-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240221-en
General
-
Target
2648-13-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
568d258032a7f45d8176c701fd3943a1
-
SHA1
74fdd3bcecd6b572cd9ba8b00702c0b795c3d2e1
-
SHA256
edca2320b8bc69dca1804c0f48e9f8765bba712ece3d7fc5875479e6252c4b29
-
SHA512
b1cc90ca39567279c7c653bb5f4a48d61ac93bde1c633bed61ae931a672be0c0c0f11835bff3896038513daf72c0c646c5c2dc0f3afa5f932bc1fcc998fb46b0
-
SSDEEP
3072:sO/9xtpdIt6C+4Rmz2/HW/mTOm7Oy1YzVFX+uJ5IsV51cY:F/9xtpdk6C+4Rc2/HW/rGObrLbVDc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.warltsila.com - Port:
587 - Username:
[email protected] - Password:
UqeJuWG6 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2648-13-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2648-13-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ