Behavioral task
behavioral1
Sample
384-20-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
384-20-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
384-20-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
18ee624152b72be9e88679c89d8fac1a
-
SHA1
5453639f0acee2eb68fc3b7e76d0be4627cd0958
-
SHA256
965cbd1736a2ae085f36b8045af382e8a959a6fe2fb3b4d804c2bd5fa78ada68
-
SHA512
7d5b0d57a3e23537930b9200af0890516cecdbe59125e1fb0e739c1d65cf7f7b8676c1789d200f4d1a4082d31d0ec7179f6dc907d57165993bb92e22696cac42
-
SSDEEP
3072:DFZeCmyuz3CtXbEzMsLXy8gcupljiHYt5xi5H6p:DFZeCmyuz3CtXbEz5XiVIHYo5a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.awelleh3.top - Port:
587 - Username:
[email protected] - Password:
NP2PpJT?idXk - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 384-20-0x0000000000400000-0x0000000000440000-memory.dmp
Files
-
384-20-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ