General
-
Target
https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs
-
Sample
230605-xj4a2sab96
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs
Resource
win10v2004-20230220-en
25 signatures
150 seconds
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:2016
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.gic.co.th - Port:
587 - Username:
edu@gic.co.th - Password:
K4z7b3m - Email To:
lindahuber@yandex.com
Targets
-
-
Target
https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-