General
-
Target
vieKruIqohwama.js
-
Size
67KB
-
Sample
221123-hcc3ysdg55
-
MD5
76bbaec4c23114922ab7984042725d2a
-
SHA1
97612b8e6e45c17b78aca2ee645bd6ec0e37853b
-
SHA256
60c0ecb470e4c5b8f985db4eef3775842081eec19ff3468f3c751b61bc44cecb
-
SHA512
9c7d3e713e03915c31be5bbc7dafc43238ab206e8b597216ae62eec62c47021c09b032b52dc903d76581018e95c39a89c72dae0245fbe4c590a4b8c231f56ea0
-
SSDEEP
768:kOWy5gufY8gJ/9Gk9RMcvqSpfDbuVp24R6Pr3zZOAsC0TZFMn1HQt2OE:nSR2SdDw2g6PrDAAeU
Static task
static1
Behavioral task
behavioral1
Sample
vieKruIqohwama.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
vieKruIqohwama.js
Resource
win10v2004-20220901-en
Malware Config
Extracted
vjw0rm
http://45.139.105.174:7575
Targets
-
-
Target
vieKruIqohwama.js
-
Size
67KB
-
MD5
76bbaec4c23114922ab7984042725d2a
-
SHA1
97612b8e6e45c17b78aca2ee645bd6ec0e37853b
-
SHA256
60c0ecb470e4c5b8f985db4eef3775842081eec19ff3468f3c751b61bc44cecb
-
SHA512
9c7d3e713e03915c31be5bbc7dafc43238ab206e8b597216ae62eec62c47021c09b032b52dc903d76581018e95c39a89c72dae0245fbe4c590a4b8c231f56ea0
-
SSDEEP
768:kOWy5gufY8gJ/9Gk9RMcvqSpfDbuVp24R6Pr3zZOAsC0TZFMn1HQt2OE:nSR2SdDw2g6PrDAAeU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-