Behavioral task
behavioral1
Sample
2028-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2028-13-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2028-13-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
60e6e8c8c07475e4539d701b1a68ee64
-
SHA1
9dcada858f3abb5febec4e8338a0e164a72e277c
-
SHA256
19d8c43616abff2abb45f557f22d75294e7ca76e38d0131e4d7aae84820a2ac9
-
SHA512
6c26175910e901bb44eb584df10a9e0139d10477edc5bbf4668c2b0b7264e02fb7f40e3c0e222e49c780875657e89de6a115f4fd3a3b457317dd90d02ec1c66b
-
SSDEEP
3072:eEaxMbHFhlNc+bchRwtgCq0EFi/+rGdo52Xec4TZ:eEaxMbHFhlNcZhcZq5RGd9eh
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.egyptian-international.com - Port:
587 - Username:
[email protected] - Password:
@@Nour60008 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2028-13-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2028-13-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ