General
-
Target
07012025_0000_PO#2500008_ Jan_2025.Xls.js.rar
-
Size
306KB
-
Sample
250107-aab4watpgz
-
MD5
ee34c1b3f176046adb40269fdb6495fc
-
SHA1
c07ae339fd5dfa14f5737937087af32371769e19
-
SHA256
5f56ca30aeced923f11377c2651244de171290074faaea9a3d85f81b3e83e3f1
-
SHA512
3aa38d1609198c69aaeed6f47eb3ba6a62aca89d0f6f1f7753cf086b8f5972199181a8a2e56ff826c5e11e2701a9bd1f30d5efe46220b625a0c2ec970096bce6
-
SSDEEP
6144:RMmNh3Nk5IqEJv/0QjgtkRLfl0CrIW8l3GYT7nXUFY4uK/VCmw1Y:RMmNjU7EJvsQjgyRjnL8X/4vuK43Y
Static task
static1
Behavioral task
behavioral1
Sample
PO#2500008_ Jan_2025.Xls.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO#2500008_ Jan_2025.Xls.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
strrat
chongmei33.publicvm.com:44662
chongmei33.myddns.rocks:44662
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Extracted
wshrat
http://chongmei33.myddns.rocks:7044
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
bizr usjt guapiims
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
bizr usjt guapiims - Email To:
[email protected]
Targets
-
-
Target
PO#2500008_ Jan_2025.Xls.js
-
Size
955KB
-
MD5
46585cfdb357b9c32e0aed02376dea2c
-
SHA1
3525ccecb41582261ba6401d34b56cfdb7ec0d1e
-
SHA256
b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a
-
SHA512
52b9a853aec1268ed4304a3712a50a59d12ae4777eb5108920b7e8518ee6800449597d43a29fc73e33e4e3375c8a9fc99e55c7a47b54bed03aea7ef48e238929
-
SSDEEP
6144:nj8EnXTkIEmXTSPAKujxQ2ZFnQsa45Z44HQ6YGhz00KY6RRs44lEhc6cgPEtcExS:nwmsGKcdssa474tYR0rGlfcEo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Strrat family
-
Wshrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2