_.pdb
Behavioral task
behavioral1
Sample
2032-14-0x0000000004D50000-0x0000000004DA4000-memory.dll
Resource
win10v2004-20250314-en
General
-
Target
2032-14-0x0000000004D50000-0x0000000004DA4000-memory.dmp
-
Size
336KB
-
MD5
3e710ba9fc7749be0f03b08df764b132
-
SHA1
69717fee987db2016f93e068c72415d7c999aa11
-
SHA256
d613e098c4432ec8c4d35f885551a80ea7421fd8babc050f086bd9b3a7fdb459
-
SHA512
204327d9c09a3c051f42d5bdf3eb488ac5d4f7d18d2a24422bfd58848cc93b753951c683a9bbeb6baeac087c6a237bb66f8a652be26cd8d0ef1f2db4678d1fd1
-
SSDEEP
3072:vRDFs40WtsKh+7Wgvq5A5EF7ZvAGbnMtyknxwb3lXs72YgVcsIplte8n:5Fs40osK8WT5AcYA3l876Vhglte
Malware Config
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2032-14-0x0000000004D50000-0x0000000004DA4000-memory.dmp
Files
-
2032-14-0x0000000004D50000-0x0000000004DA4000-memory.dmp.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 308KB - Virtual size: 307KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ