Behavioral task
behavioral1
Sample
4672-4-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4672-4-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240412-en
General
-
Target
4672-4-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
282702084a8fd7382488727414b96573
-
SHA1
0af9c6693486819c7bdda23495408c9bde68025c
-
SHA256
b28e81330476141650717de543a3db6d170011b6cb676e11ee5feed4085af053
-
SHA512
2e8c5153a11e0cdec802f930070100596d9cf2c8e09914b29c758331c54279b63e764ad77242b835fa4705ed2d5c3611444e39e3f73fc3eb6b12e47d5ff44e49
-
SSDEEP
3072:U9IC/UOYVFOXY2FODw7nOGz+gT+G5t7LhpQhp:U9IC/UVVFOXY2FSw6Gqe+oLh6
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7017233680:AAEfWTUjfiK5hxLLRkmgitv57SQZuFap4nQ/
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4672-4-0x0000000000400000-0x0000000000440000-memory.dmp
Files
-
4672-4-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ