Behavioral task
behavioral1
Sample
dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608.exe
Resource
win10v2004-20240426-en
General
-
Target
dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608
-
Size
166KB
-
MD5
0b908c918e6d2a93c14104bd1de05964
-
SHA1
88114b3ea08d3b93a1e8e8e79148816194e13f98
-
SHA256
dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608
-
SHA512
f77f19028809698cc92548ebc1fd4781bad59803172a65d6818cb95c6ceedd893ed874971fd7164b54b1a8bd239bd06fc69950c6123d5c9e4abe6e3a9a327380
-
SSDEEP
3072:ksLQ5RNe6DPAfY8uXCYohiC5mhxCs4eCtt+SBSwhnSOGYuIPedBdi:HOtPAfY8uXCYohiCkXJgjnG6Gfd
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1066985564278112277/oJEckb7xFKv0BG0FKt3E17kO22JxA9MO_wlyHpptkN3oVroODKUfIe2deqgQzS3t3nQI
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608
Files
-
dc689cc3d6cc79bc091b67efbc8b52dea65554faa1f79c5870151b6007ceb608.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ