General
-
Target
Product Pics.js
-
Size
691KB
-
Sample
220621-sa1fksghc5
-
MD5
4e242d24414292cd483040d98077d9c0
-
SHA1
eb905837358a70d81ef596465fad195c4057a015
-
SHA256
2cbdc90aff35e74892a04e4ce75834f0c419996330f15692575c1862781e63b6
-
SHA512
4578ba5e7139da61a38907a8908374ce49668d8199b756e694db300e20459084a60adee335bc30ac15a0f4b1038e01ccc49e83991a593eb564fc8d541aba8826
Static task
static1
Behavioral task
behavioral1
Sample
Product Pics.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Product Pics.js
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.leaf.arvixe.com - Port:
587 - Username:
[email protected] - Password:
000000
Extracted
agenttesla
Protocol: smtp- Host:
mail.leaf.arvixe.com - Port:
587 - Username:
[email protected] - Password:
000000
Targets
-
-
Target
Product Pics.js
-
Size
691KB
-
MD5
4e242d24414292cd483040d98077d9c0
-
SHA1
eb905837358a70d81ef596465fad195c4057a015
-
SHA256
2cbdc90aff35e74892a04e4ce75834f0c419996330f15692575c1862781e63b6
-
SHA512
4578ba5e7139da61a38907a8908374ce49668d8199b756e694db300e20459084a60adee335bc30ac15a0f4b1038e01ccc49e83991a593eb564fc8d541aba8826
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-