General
-
Target
INV2020.06.09974.DOCX.exe
-
Size
331KB
-
Sample
200716-bbqzm6xp22
-
MD5
8dc8dd6ff7a50bf1bdcdaeea069a4ae6
-
SHA1
133cb0200309be4089f1c60ecb9c0db1fb66f551
-
SHA256
c94596dbfbc9fde422a8f6b20fc6e488d9fcd33931e0e2e07430824eeff8a04a
-
SHA512
d2bd87fbc8fb5b2f60cafe9b65561647f637853550dd57430e062aae4856ca9984e4246a327d3611d674bdf1fdaebdaf0b3f8f94604d987990a78f708bce11fc
Static task
static1
Behavioral task
behavioral1
Sample
INV2020.06.09974.DOCX.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
INV2020.06.09974.DOCX.exe
Resource
win10
Malware Config
Extracted
asyncrat
0.5.7B
null:null
AsyncMutex_6SI8OkPnk
-
aes_key
DHyXENUbuF7kz7qg9whtglVdx8ChMDvS
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
null
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
https://pastebin.com/raw/63NgqBcT
-
port
null
-
version
0.5.7B
Targets
-
-
Target
INV2020.06.09974.DOCX.exe
-
Size
331KB
-
MD5
8dc8dd6ff7a50bf1bdcdaeea069a4ae6
-
SHA1
133cb0200309be4089f1c60ecb9c0db1fb66f551
-
SHA256
c94596dbfbc9fde422a8f6b20fc6e488d9fcd33931e0e2e07430824eeff8a04a
-
SHA512
d2bd87fbc8fb5b2f60cafe9b65561647f637853550dd57430e062aae4856ca9984e4246a327d3611d674bdf1fdaebdaf0b3f8f94604d987990a78f708bce11fc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-