Behavioral task
behavioral1
Sample
2504-15-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2504-15-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240419-en
General
-
Target
2504-15-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
766c885b40737a0138744bc23ad21203
-
SHA1
bd01593dbd079d32818a2d89f832e59b8919e7d3
-
SHA256
45d53e0c9c76c7c5d94758240a429c357a5c205b4e31db93e1134edabf9bee98
-
SHA512
ca0623df9a70e7aa8b2e7b7aa611ad16b5279a5ffce9283d72ac38906a3624f442678f952b0d9fe2d8b32517cd630c5bd20b7bbf67a6b7e00f05e160f6eea012
-
SSDEEP
3072:bpox1JlxBa45MBbT5YK6kEBu8T5Sx89X3o:bpox1JlxBa45SbT6K6keDA+9n
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2504-15-0x0000000000400000-0x0000000000440000-memory.dmp
Files
-
2504-15-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ