Behavioral task
behavioral1
Sample
5620-4423-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
5620-4423-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win11-20250410-en
General
-
Target
5620-4423-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
65a0d1e99428bf22e6d1c0738bf263a1
-
SHA1
afd15fae1bcd20f7c72dbfb50ac7453740f12f9d
-
SHA256
5ad0c6f7e197ce4742a7fda218ada51bbecaefcba53d23d28962d5f22d96a8a6
-
SHA512
4097019965baeaa4e3b70077b6f81a49481a1a13b953edba1c6078e08543aa2aeab244001d0a86e70e0dfd7ccf89385c3b544edaa27003d6da6a598f7d4f6c1f
-
SSDEEP
3072:VBFOSvdczBNZpBFZ080GFLzdUI1PQ+5ckW1bGLj:V5dsBFBFZT0GFdTQ+GHb
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.grupomorales.mx - Port:
587 - Username:
[email protected] - Password:
!%J8}*dhpT{{ - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5620-4423-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
5620-4423-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ