General
-
Target
AWL DOCUMENTS.exe
-
Size
1.1MB
-
Sample
210721-c9c4g4gqla
-
MD5
dc7c594729e403ce1d87f86e3a7b19cf
-
SHA1
067371590de6f458e54bb34640ee2ef68156cc4e
-
SHA256
723b9b35a4589438b1f7b3aa1306762c1a8bbb40e58b721bdb26248cfe5b4817
-
SHA512
42ed8d8cfbb190e908000ca7d65340bc412cf81db81e04105817b78aa2dc88bccd22de43b0e5f2b983433729b3bb2203224fe27b07832ef0b28d6cd4a6a3d504
Static task
static1
Behavioral task
behavioral1
Sample
AWL DOCUMENTS.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
AWL DOCUMENTS.exe
Resource
win10v20210408
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.saisianket-tech.com - Port:
587 - Username:
[email protected] - Password:
oluwagozie123
Targets
-
-
Target
AWL DOCUMENTS.exe
-
Size
1.1MB
-
MD5
dc7c594729e403ce1d87f86e3a7b19cf
-
SHA1
067371590de6f458e54bb34640ee2ef68156cc4e
-
SHA256
723b9b35a4589438b1f7b3aa1306762c1a8bbb40e58b721bdb26248cfe5b4817
-
SHA512
42ed8d8cfbb190e908000ca7d65340bc412cf81db81e04105817b78aa2dc88bccd22de43b0e5f2b983433729b3bb2203224fe27b07832ef0b28d6cd4a6a3d504
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-