Behavioral task
behavioral1
Sample
1924-19-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1924-19-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
1924-19-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
ccec039e959a51c5fc9af46c57e1beaf
-
SHA1
5603cd4cb3ebf52aa9b777d28403cb087fc7251e
-
SHA256
bbb89a30911a01c7ced62fea201557e942acd2b94a762d940524d4221e6947ea
-
SHA512
07adfa2d3ca9189a264d2d4299bf9bde769d1cbbeca260eca7a2999f89cbbc89d7b9a6dd398564fef223478c5d4d80fcf4aa8672bb4e446e6c0fc6e18ddf8630
-
SSDEEP
3072:PcxtpdRvI7RYVt9w4FZu8Ok2Luk/jtJ5oRfOPhy:UxtpdRQ7RYVt9w4FZELfjtefEh
Malware Config
Extracted
agenttesla
Protocol: smtp- Port:
587 - Username:
ftp://[email protected] - Password:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1924-19-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1924-19-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 238KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ