General
-
Target
INQUIRY#46789-AUG24.js
-
Size
616KB
-
Sample
240829-gmgcpawhkb
-
MD5
c32b30698d7c4e0f9d674e7809f10fb6
-
SHA1
522077297fecddea89006116313701d923b65000
-
SHA256
3992784614112361e6f52a59f99526a834a1a471eb74b708605d6d90188848af
-
SHA512
0d5fade8b6174054f062ba801eff0b516d99276afd67013aa691ac027933abd4d60bf73c1a253864ffbe40a0141cf7acd6ff95fb0097d99075af5f13bc9fd459
-
SSDEEP
12288:G2/iUeEUN6ULhg/ndgF+xjvvT2ZBxoQ3MhzxVDYzayq8Q5CJY0smYkBQPU7H8C6X:G2XFPj6GmEgpj6AZs
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY#46789-AUG24.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
INQUIRY#46789-AUG24.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Targets
-
-
Target
INQUIRY#46789-AUG24.js
-
Size
616KB
-
MD5
c32b30698d7c4e0f9d674e7809f10fb6
-
SHA1
522077297fecddea89006116313701d923b65000
-
SHA256
3992784614112361e6f52a59f99526a834a1a471eb74b708605d6d90188848af
-
SHA512
0d5fade8b6174054f062ba801eff0b516d99276afd67013aa691ac027933abd4d60bf73c1a253864ffbe40a0141cf7acd6ff95fb0097d99075af5f13bc9fd459
-
SSDEEP
12288:G2/iUeEUN6ULhg/ndgF+xjvvT2ZBxoQ3MhzxVDYzayq8Q5CJY0smYkBQPU7H8C6X:G2XFPj6GmEgpj6AZs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-