General
-
Target
38e3fbfe-0244-439b-334c-08dcf3dd22d2.zip
-
Size
58KB
-
Sample
241028-f2ea7ssbjr
-
MD5
b9519bb0ee97b19bd39154509346dd05
-
SHA1
71b469bbd2ec77f10d6f7d520da29844eae10249
-
SHA256
6fd9e1615f35936de97c300f336f368a0e1798638292f8a9dcbaa7df39a66687
-
SHA512
d036669d5b8f76793b3aed802beebf6d1875a867c1907921dd434ea283c98583b42b5c7f5be98b76da125c5852035b02f7f5ca55b80fd49595ee9c7287609b1a
-
SSDEEP
1536:KwrQmWGWCvcnunt16d01SHsVuYpIPJn8h78:KwJWGXviq9cEuYWPl8R8
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-CanparFFTradingCo..js
Resource
win7-20240903-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus360 - Email To:
[email protected]
Targets
-
-
Target
RFQ-CanparFFTradingCo..js
-
Size
180KB
-
MD5
0d3505de58b29682da0f4799e7812306
-
SHA1
9a411ead4bdbed963fdbaafd5729a77a35e63e66
-
SHA256
11d08c101934f51cee60658bbeb71a5988873bfacba3c00f25cea0bd67442926
-
SHA512
c037fef1c0ccb0fff448d0d2344c3edfc2613529ee04133a44b29ed111df9ded4b79f57057edc02c230c68827a0d2b3b1ea3f32f6ce583dd80c61a81b064ef90
-
SSDEEP
3072:94SWDYRx3twtUMy2xtn4BRGLGqlT6HYlxKm3+FmEM5SGDZx392xtn4BRGLGqlhG:xWAx3R4t4BRgjR64lIm3a1ZGdx394t4V
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-