Behavioral task
behavioral1
Sample
1360-87-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1360-87-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1360-87-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
db57f947aa2f7fb403173103f2d4b7dc
-
SHA1
4e45845d1087bb79a9f240e3b9bd5674fb082a7f
-
SHA256
61c4e50bfbfa6a5654a6aa5631c82c1312b69d492991c3a2b66f0814cba80348
-
SHA512
242e659cb3f3c43f5c10d165889c288dfb4d1dfd7e8a71523b14f091ef5332813e7adf069ff93c740f1ecce018a32e28681fe0e63ff8c3c556833e59162f0e96
-
SSDEEP
6144:fsNxJRtZdRM2OK8eya5QPT0ZGuBORiU6F+VKRO:QJRtZdRrOPeya5QVIU6KV
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.jlahuachem.com - Port:
587 - Username:
[email protected] - Password:
vUPm^yS5 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1360-87-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
1360-87-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ