General
-
Target
order_document_sheet#PO35642_1.gz.zip
-
Size
406KB
-
Sample
240619-nv55cazcpa
-
MD5
41a7016acbf940ee8bcc47c661b2d759
-
SHA1
cf30a3dbb0177934c42017322f64a615fa84e00c
-
SHA256
8f5d17c2f22abdecfe0a7ee5d656951f0bd783988990c9df517c03b83157a73f
-
SHA512
c0b400ded4b1b636398cd06a6333978f088241889bc7b5b3838288e41d33d0ab0bea9290a5ce994875292f04c294fe88206256f9e6aa99fc2c2d00349bd53095
-
SSDEEP
12288:AciPmsgmHHvt/PYljHUNmmy0VxkFVeFt0yup9YT:hmvtYlgNmmyIxkHmKyuHYT
Static task
static1
Behavioral task
behavioral1
Sample
order_document_sheet#PO35642.js
Resource
win7-20231129-en
Malware Config
Extracted
xworm
5.0
107.175.101.198:7000
dvNrQCwanoQ9ouuD
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot6410198048:AAGgeWnhGxZeYMKJkRauoOJwGKdxJztyd4k/
Targets
-
-
Target
order_document_sheet#PO35642.js
-
Size
576KB
-
MD5
da2a00db4ad85a7c84c8e3bdd158ed5b
-
SHA1
fac36df9615e08267ca51c5c32db76b5d5a3b047
-
SHA256
0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e
-
SHA512
e09e36d25ccbc7b443c215adcd013c40da9d78c82ae479326c4f92b8fabc26b8fa3f6c937fdd2b717f37330999d03928c02cd98ba0c0987245e9118770976e66
-
SSDEEP
12288:p68zPt15vj0FBKG5UmvOvhdvHVJwvPRjgTC7oS8Qo/A5Ih:p68zPRIFBOdvHvwXyTC7o5bh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
StormKitty payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-