General
-
Target
scan_374783.js
-
Size
3KB
-
Sample
241007-rfdy4asgjc
-
MD5
c6b0c8c717d6f6b0fc0747c349821280
-
SHA1
e7b0686c4eebc8285ae5a2eb2c70a602b451b0d6
-
SHA256
9eb68fe0683e79b88e4b37a2b038336192b516c5f975bf8636dc1565432bbdbc
-
SHA512
434a2c6fe2ff42715e1ea6807e37d40852aab4ce0cac8af7ddd52327f503c72eb5544f221c15080b341942f6a79b9279679dbb04fa8216e2d5616c53df0fcac7
Static task
static1
Behavioral task
behavioral1
Sample
scan_374783.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scan_374783.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
scan_374783.js
-
Size
3KB
-
MD5
c6b0c8c717d6f6b0fc0747c349821280
-
SHA1
e7b0686c4eebc8285ae5a2eb2c70a602b451b0d6
-
SHA256
9eb68fe0683e79b88e4b37a2b038336192b516c5f975bf8636dc1565432bbdbc
-
SHA512
434a2c6fe2ff42715e1ea6807e37d40852aab4ce0cac8af7ddd52327f503c72eb5544f221c15080b341942f6a79b9279679dbb04fa8216e2d5616c53df0fcac7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-