Behavioral task
behavioral1
Sample
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Resource
win10v2004-20240412-en
General
-
Target
730e0761bc2f71e8152678d4d5ddb4a600a1bc19f87f1d6300c0679fab73f342
-
Size
82KB
-
MD5
2c8743bff875b0038f669e36bb0fa85c
-
SHA1
2c89fbfa94cd769421e1f1107a3746645e5cd4af
-
SHA256
730e0761bc2f71e8152678d4d5ddb4a600a1bc19f87f1d6300c0679fab73f342
-
SHA512
7be8f63d8a4e89e54a24c344f53fa292f0fe1a685c7c6a424f256c9de2c4df21ba10f0a928338c04b2f3549bcfe8aebf6174f4bdadf1548415af6a35efb186b5
-
SSDEEP
1536:nWq+aj4J4ql0yKDfcr/0gK7zFgKvi+dWtMiHf/T0iZLuwZ3Jzcl63K8m:1q4qlwTScB9rdkM0rD7Z3V0cm
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.cefin.bg - Port:
21 - Username:
[email protected] - Password:
#UuXy?6cIbL+
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Files
-
730e0761bc2f71e8152678d4d5ddb4a600a1bc19f87f1d6300c0679fab73f342.zip
Password: infected
-
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ