Behavioral task
behavioral1
Sample
2188-13-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2188-13-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
2188-13-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
de04847f5db0e03619ae06b3bc90ee7a
-
SHA1
ce3dcd8fa40b6231b8d666044f9d5419cffa8728
-
SHA256
d4f1e4d6518d47172bc6a7849111d84db44ac446bb55ce73e952969617a03504
-
SHA512
81d8890516563966c94369f9652e5e1dbeb07c7376505977af850ddde59fe472b575ca8874fbd9e6132f936a598ac4b8d4baf8cd9346ea43e53181c060af8732
-
SSDEEP
3072:bF7yuyGC2+FL71bfzBybgC34h1UtDr5B1Ctlk:Z7yuyGC2+Fn1bUbgt1sDtCr
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
tqpas.com - Port:
587 - Username:
[email protected] - Password:
Ot939393! - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2188-13-0x0000000000400000-0x0000000000440000-memory.dmp
Files
-
2188-13-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ