Behavioral task
behavioral1
Sample
50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41.exe
Resource
win10v2004-20240412-en
General
-
Target
50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41
-
Size
234KB
-
MD5
b8bf53bd1b6236e6e4e1de037830802c
-
SHA1
a8b9be18347a91bf7d4acaf08fb910a533084620
-
SHA256
50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41
-
SHA512
ac6e5cb49de3940ff1cfaf836bc217d5e3a694cc9bace130fcb3d6bf58cd94635f5ee22acba20c9d054c4e002e73f31bd0f496ab5f1854bcc323d23f2f710dbc
-
SSDEEP
3072:HKULTqDUAwYoXQA8nA2oZ7hRyP5MT5evNVhQ:HKULTqDUAwYoXQAYyNXyc5Wf
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7124146126:AAGAbs9iw3XzfgH3tTN58djGN81AnAy9t-E/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41
Files
-
50efb12a800e55214863400a9c791d3675569f605e91098cad8f6d0d158a0d41.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ