Behavioral task
behavioral1
Sample
3056-1095-0x0000000000390000-0x00000000003D0000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3056-1095-0x0000000000390000-0x00000000003D0000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
3056-1095-0x0000000000390000-0x00000000003D0000-memory.dmp
-
Size
256KB
-
MD5
aef6322d459a4bff52494936320b3bde
-
SHA1
0b288c3cee036f97f21c65282344ed3f58a67662
-
SHA256
6c88faac69956c9e29449eb745a3fe384df87e4f4c1d32fd8bbe6af4c4174b6a
-
SHA512
6af60f5e5e55ae8b43cd18f23b1a1b2d7339120281673378eea2dd211e6909864b27b331a15677c6f1e50b9c93e3be6b145c5bbbe0f68caf716f5f1b5fde3b8e
-
SSDEEP
3072:Z+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4:Z+2Lmlx1JldSVxbBF643yOdx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3056-1095-0x0000000000390000-0x00000000003D0000-memory.dmp
Files
-
3056-1095-0x0000000000390000-0x00000000003D0000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ