Behavioral task
behavioral1
Sample
2768-29-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2768-29-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2768-29-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
46b0f5e84bb19f3d61ac1b4de1015435
-
SHA1
aec6368b4b3ad54cf2ff822f8dc69143916ee48e
-
SHA256
b758281dd1be2195165c143952a9718837389d16a5856a14c0991769186d3c08
-
SHA512
ea6f10fac0524151612c0957d4dcee3165bd492234a2b544650bc6c5b6af97cd840add1bb87c902ba66354786e7b502cdd8857a07b9bc7d765b6d8c34b64a148
-
SSDEEP
3072:lUCXtZdRtyyPQp2WTyqimBW/7IksBh7B10Zc5MDH553QJR:WCXtZdRtyyP420yqimBtk+XA9HL3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bethesdakindergarten.com - Port:
587 - Username:
[email protected] - Password:
kindy6014587474 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2768-29-0x0000000000400000-0x0000000000442000-memory.dmp
Files
-
2768-29-0x0000000000400000-0x0000000000442000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ