General
-
Target
UAB VISI ATSAKYMAI30000290161120220112162613..js
-
Size
45KB
-
Sample
221124-lrmgqaeg24
-
MD5
2b4fd5e86969e9a8b56ce60175c15866
-
SHA1
0e6890d6be1462aa5576a00ddaac640214e70256
-
SHA256
0075ad3afcd0768928f57844818f6c0765d84d358415075f047346ec119242b0
-
SHA512
7769908e20121e3e50fea394c16497a99ceae2313af6e7c8bd9952bd8ea8bf0a71aba1fbd47f1462281c91b0db7aa21896413660069b8e413ea8cd65f925f4db
-
SSDEEP
768:NZLlAbEuwYu+sN8Ra/4Rm9yLudr3i+ngm6rEZC0Sao4:C4uoNcawo9sUr3i+ngyC0Saj
Static task
static1
Behavioral task
behavioral1
Sample
UAB VISI ATSAKYMAI30000290161120220112162613..js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
UAB VISI ATSAKYMAI30000290161120220112162613..js
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5655543251:AAF6zs8TWZ5wmyQhXrUZEpQjh6VaOy-aYoQ/
Extracted
wshrat
http://snkcyp.duckdns.org:3369
Targets
-
-
Target
UAB VISI ATSAKYMAI30000290161120220112162613..js
-
Size
45KB
-
MD5
2b4fd5e86969e9a8b56ce60175c15866
-
SHA1
0e6890d6be1462aa5576a00ddaac640214e70256
-
SHA256
0075ad3afcd0768928f57844818f6c0765d84d358415075f047346ec119242b0
-
SHA512
7769908e20121e3e50fea394c16497a99ceae2313af6e7c8bd9952bd8ea8bf0a71aba1fbd47f1462281c91b0db7aa21896413660069b8e413ea8cd65f925f4db
-
SSDEEP
768:NZLlAbEuwYu+sN8Ra/4Rm9yLudr3i+ngm6rEZC0Sao4:C4uoNcawo9sUr3i+ngyC0Saj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-