Overview
overview
10Static
static
109a25a65d...f4c.js
windows7-x64
10109a25a65d...f4c.js
windows10-2004-x64
1031f0b844ee...a6.xls
windows7-x64
131f0b844ee...a6.xls
windows10-2004-x64
1641d80a70d...d2e.js
windows7-x64
10641d80a70d...d2e.js
windows10-2004-x64
108aa5dd5a83...486.js
windows7-x64
108aa5dd5a83...486.js
windows10-2004-x64
10e79d5e1f9f...b4.vbs
windows7-x64
1e79d5e1f9f...b4.vbs
windows10-2004-x64
1General
-
Target
mal.zip
-
Size
1.9MB
-
Sample
221229-a3ck4sfb5s
-
MD5
531973e4c77b6ef57ba482c556a883c8
-
SHA1
4f2c81e8daf58de3d3e6ec2bec24314d7b2c98d1
-
SHA256
09b361c61bcd3e3c9a8eda0a5260d953dd3bd749dd6d037d26cdfec0474a972e
-
SHA512
f6d73b84036541f98cc2aa65421a41d24cf9fb4ede3f9751a1e49596261b958ce309137788b07c714e1498f45c30e0e973719622c6593434e71799fa068683de
-
SSDEEP
49152:pLq43Tw08nhN9W5Yc+5AmYJVm29u0OJzqEwZZ7EHY:f3nwNQqHARhsFJzqEwZZ7EHY
Static task
static1
Behavioral task
behavioral1
Sample
109a25a65dcb12435377b0f9f4159f4c.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
109a25a65dcb12435377b0f9f4159f4c.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
31f0b844ee61cd2c8bbea74fc2b09ba6.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
31f0b844ee61cd2c8bbea74fc2b09ba6.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
641d80a70da56a8b33cbaff530cf6d2e.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
641d80a70da56a8b33cbaff530cf6d2e.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
8aa5dd5a8392d399292fd831f9ebc486.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
8aa5dd5a8392d399292fd831f9ebc486.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
e79d5e1f9fff4bf994e5538522b24eb4.vbs
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
e79d5e1f9fff4bf994e5538522b24eb4.vbs
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
server240.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@
Extracted
agenttesla
Protocol: smtp- Host:
server240.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Success4sure2day10@ - Email To:
[email protected]
Targets
-
-
Target
109a25a65dcb12435377b0f9f4159f4c.js
-
Size
403KB
-
MD5
109a25a65dcb12435377b0f9f4159f4c
-
SHA1
1579ca605a83527a8befe3edeaff3d4feaa293d4
-
SHA256
1deb0b650909a1e7895b5b8f315428ac66353161513e5de9261c7477c7bdc386
-
SHA512
a268722c75135d95ffbbba8141154a571d10ac5662348e314f7dcc2c67f36d43c8a9a89a4787d9ddeb8960503d6a50ded415b95c795e8c6c426b9aa6f09e0e95
-
SSDEEP
6144:Rcem0BIMD9F+gX64GsJI1s2eVawLGkIHEC6kOnylYYADJKV91XFzza:eeTIiGA6/sG11wLGdbAMV9a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
31f0b844ee61cd2c8bbea74fc2b09ba6.doc
-
Size
55KB
-
MD5
31f0b844ee61cd2c8bbea74fc2b09ba6
-
SHA1
c956ea668864997f9aeab19b839ce258a8a07307
-
SHA256
124745723b74fc19237fb080c475b4dfb39cd722d2fa75da7da0b4f5c8f0e487
-
SHA512
72238cf2c0fcf9180fa266b91219e52db208a767fcfca96cbf4b5d3ae63e303813f6faa76d6fb87ba7bceb96a2a7cad98153fc2b7becb96f73f1ce4d05fbbd9f
-
SSDEEP
768:m8bEH73eGpTJ9Stu47xi41EyN4S6rz0VIZ:AzeAF9S4HP/we
Score1/10 -
-
-
Target
641d80a70da56a8b33cbaff530cf6d2e.js
-
Size
267KB
-
MD5
641d80a70da56a8b33cbaff530cf6d2e
-
SHA1
9dc182e6dd82a28c2546583bdd2c4d7a86f70aeb
-
SHA256
bc6b3044943128e9f326b4c0bde41375596254ac5fb4f0e8c00c2eef33688247
-
SHA512
f0de610da7b3be90db1c591a973fde1da4f6c2e6b27e388d3d7086e1ad975de1d9c645beff98c0b7f193438839d29a36c059f17fe874d7d4ce31feda39228481
-
SSDEEP
3072:U/YirPgDvzlvtD636gUNgUmMuUbemcVGHQmC+DYUzSsqbDrCPx7Yvgke/ikIS363:JpvtD6DumBVGHbrSPrCpkvM3RlP6Rb
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
8aa5dd5a8392d399292fd831f9ebc486.js
-
Size
48KB
-
MD5
8aa5dd5a8392d399292fd831f9ebc486
-
SHA1
b7815f4df84394870dd7ca91c731fe606f726afd
-
SHA256
754416cc0f441aef7bacb842368fd06744048c4219943d5bd093e2a7e17f9267
-
SHA512
82b1f15b16f4f73947165084ecdcf9ef28ec02f29ceb86eb1ba831c9b2d561d72c311965532a363bd03cbcca0f8497acf8e9a3672c29a86cfe71ef1aa4e4e78a
-
SSDEEP
768:9ELx847vqNaCQVUmobI2iSi5B7sqkl3enKxNH7sse:W4Q8xsB7sqkW8NHI5
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
-
-
Target
e79d5e1f9fff4bf994e5538522b24eb4.vbs
-
Size
2.5MB
-
MD5
e79d5e1f9fff4bf994e5538522b24eb4
-
SHA1
b341ee89c031dd3aeba06c26557fb2a2b0a0b9d5
-
SHA256
5de77f2f3ae3370ff275b412721dba5fb7d1b09ed16a219af4293af34f80d4c9
-
SHA512
576c5a8803009d4ffc3d752b9414488043a95c6440c28d7de238346b6cad31e0160a54af7744e74de27f90ecb84d44da2a6744d6807ee19553504e44da5b245e
-
SSDEEP
49152:ju+35qFXTaUXVhcZTYURtDPczv5uRSq/a:Y
Score1/10 -