Behavioral task
behavioral1
Sample
2540-16-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2540-16-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240419-en
General
-
Target
2540-16-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
4fdee98b6fef3aa6f49033f850f7d675
-
SHA1
0fc0da9017a602214177df1893b8c75ff0c9ba37
-
SHA256
997b4ca8c1fae8f9a68edfbc665cf5aea19d15d50468ec4efa149845c2b3023e
-
SHA512
c8d1ba760ee1ae74e46b3219334ba93a4fbf95d4550404f5b12ab13f8096961b35cde74c5bd9a1d4cffdc622c0ae5af8685018e3ecc8ae68935d1334a3a945c0
-
SSDEEP
3072:fIgsZ7xtRFHTbfL5AUFjQtRbYkiu3qRn5x0+JdVlsc:fIg67xtRFHTztAa0/iu6RF7r
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2540-16-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2540-16-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ