General
-
Target
https://cdn.discordapp.com/attachments/1240773040221196319/1242622210988838922/Purchase.js?ex=664e819d&is=664d301d&hm=9831c346d913e255806aeb7c08f8a43cde2fe4bccbad9a77bf74f9f9d6e22e9e&
-
Sample
240522-k3eqksac81
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1240773040221196319/1242622210988838922/Purchase.js?ex=664e819d&is=664d301d&hm=9831c346d913e255806aeb7c08f8a43cde2fe4bccbad9a77bf74f9f9d6e22e9e&
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
boydjackson.org - Port:
587 - Username:
[email protected] - Password:
Bukky101@ - Email To:
[email protected]
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1240773040221196319/1242622210988838922/Purchase.js?ex=664e819d&is=664d301d&hm=9831c346d913e255806aeb7c08f8a43cde2fe4bccbad9a77bf74f9f9d6e22e9e&
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-