Analysis

  • max time kernel
    26s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 19:46

General

  • Target

    BastianHein Malware samples/AgentTesla/31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c.exe

  • Size

    1.1MB

  • MD5

    d5ee88c8a72921aa9dca20317ed1ef5e

  • SHA1

    5d9a100342fe7383479829d2d24343ee735a1826

  • SHA256

    31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c

  • SHA512

    29b3c4a0a1bf10ff0aa55cc6a26fa96e8b373e18dbb8eab6c344c64ed06cea13de5c27d6cd9f15649d6b317e7f44c1add939561235910747beffbcdb86a5f6a6

  • SSDEEP

    24576:aUMC8CuZtC8YIBKHfaKWBECn6g2s0O8BD48rWHFDW+1RUrC:aU8CJ6BKHfavBECn6gL0O8BD48rWHFDD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BastianHein Malware samples\AgentTesla\31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c.exe
    "C:\Users\Admin\AppData\Local\Temp\BastianHein Malware samples\AgentTesla\31c25e01cbaaeadccfa1321680bbfd51c17b876859be87fff22b2db8ee1e117c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2352-0-0x000000007468E000-0x000000007468F000-memory.dmp

    Filesize

    4KB

  • memory/2352-1-0x0000000000300000-0x000000000041E000-memory.dmp

    Filesize

    1.1MB

  • memory/2352-2-0x0000000074680000-0x0000000074D6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2352-3-0x0000000000600000-0x000000000061E000-memory.dmp

    Filesize

    120KB

  • memory/2352-4-0x000000007468E000-0x000000007468F000-memory.dmp

    Filesize

    4KB

  • memory/2352-5-0x0000000074680000-0x0000000074D6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2352-6-0x0000000000560000-0x00000000005E6000-memory.dmp

    Filesize

    536KB