Behavioral task
behavioral1
Sample
2280-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2280-12-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
2280-12-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
2d249051aa49c1088a93e867ae83c6b6
-
SHA1
b0d8eabb2f4597547da8ef3f880553a85c7226cb
-
SHA256
ed5dd3adb63400106737b4d042479bbfeeab72b4915871bb9473424aa44f3107
-
SHA512
57b338e63dc36546e97b1dd84166b383642a4a7f8c8e1032cb10eaef3dc698e3188b54dce8a6a13e210efeae03c19c25aa6ee31a8ed32608b091400932e55204
-
SSDEEP
3072:W+Y78YEY4nvBCA6is+AsxGBmzb05iS5HUwoeE:Wl78YEY4vBCA6bc8CbFIUD
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hotelroyal.com.pl - Port:
587 - Username:
[email protected] - Password:
W0xw6jA.Hdr3 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2280-12-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2280-12-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ