General
-
Target
PURCHASE ORDER.js
-
Size
9KB
-
Sample
221125-qjx1psaf36
-
MD5
16c4ddc03574fceb943c030a5a212b5b
-
SHA1
9ea19de607ac1555b8bbde4eb7ebbe3923c5c48a
-
SHA256
645423787bf6aa30b5d9433aaad2f6ea09948abf300eeaab02b4d826f215adea
-
SHA512
0abb16552f60f126c960a23dd387c50a5b13dcb52b0bec7d4bd7f344a8784bed743ee8972daeabe5433686c0f34be38baaf5e3ece1eb6f8030c4e30ec2605916
-
SSDEEP
192:J4p/DY8bzwDuDeyev2AgP4iO+zeypRyNAEA8zn4SUdhxoP0lPCPTQSIuAt6aW4I:mrmDcsiO8ySsGdhjmTQSIuAt1k
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.js
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
PURCHASE ORDER.js
-
Size
9KB
-
MD5
16c4ddc03574fceb943c030a5a212b5b
-
SHA1
9ea19de607ac1555b8bbde4eb7ebbe3923c5c48a
-
SHA256
645423787bf6aa30b5d9433aaad2f6ea09948abf300eeaab02b4d826f215adea
-
SHA512
0abb16552f60f126c960a23dd387c50a5b13dcb52b0bec7d4bd7f344a8784bed743ee8972daeabe5433686c0f34be38baaf5e3ece1eb6f8030c4e30ec2605916
-
SSDEEP
192:J4p/DY8bzwDuDeyev2AgP4iO+zeypRyNAEA8zn4SUdhxoP0lPCPTQSIuAt6aW4I:mrmDcsiO8ySsGdhjmTQSIuAt1k
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-