Behavioral task
behavioral1
Sample
2104-18-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2104-18-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240426-en
General
-
Target
2104-18-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
1a50ce490f5667692de858d9b1d01392
-
SHA1
8c7c214e489682cfd6cc6343d670e58543f7edad
-
SHA256
e8907ca5852f4e6ddf8a5a3134d9846962da285e2d66cc816ed3f6d3eefdb91e
-
SHA512
247248e36209749f7ef3554a7179aeffdc0ba10801530e4c7e677565bb12edac53944fa501f69db605583aba1e15c526eab997e356b7b3f9eb2d19bfc1b8dc74
-
SSDEEP
3072:0D9iPrnb/3HzmuqOqEzjmV0GixG5k+bfMPl:siPrnb/3zyOXCVLixsbU
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://stpindo.co.id - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2104-18-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2104-18-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ