General
-
Target
f6f06d960291d57697aaba85675aad68e6c677b91ef42d1a04ad84a3e9b54a30.js
-
Size
73KB
-
Sample
250122-efqlnsxngj
-
MD5
99ea1ce1d4123a7538e0810d2bb919b8
-
SHA1
ec8ee7dc4ea3ce0045f1a6569b945f586aeaf7cf
-
SHA256
f6f06d960291d57697aaba85675aad68e6c677b91ef42d1a04ad84a3e9b54a30
-
SHA512
210cf92fc65479b91a2874b60b14bf599a356a392c066f41501d571e8182fc2eb938217be20fdf6196d7cb20e53bb90698509b2c16c7e5c0ad630aa930cb939b
-
SSDEEP
1536:y54izQ6VsYh/t5MKvJIp4LkWnwK7mMcAtRwK9t:yRzQ6V1/vVld
Static task
static1
Behavioral task
behavioral1
Sample
f6f06d960291d57697aaba85675aad68e6c677b91ef42d1a04ad84a3e9b54a30.js
Resource
win7-20240729-en
Malware Config
Extracted
https://res.cloudinary.com/drqpeaaky/image/upload/v1737456477/b6fxidzmtogras7c2a5j.jpg%20
https://res.cloudinary.com/drqpeaaky/image/upload/v1737456477/b6fxidzmtogras7c2a5j.jpg%20
Extracted
Protocol: smtp- Host:
novida.com.br - Port:
587 - Username:
[email protected] - Password:
joymywife12345PT
Extracted
agenttesla
Protocol: smtp- Host:
novida.com.br - Port:
587 - Username:
[email protected] - Password:
joymywife12345PT - Email To:
[email protected]
Targets
-
-
Target
f6f06d960291d57697aaba85675aad68e6c677b91ef42d1a04ad84a3e9b54a30.js
-
Size
73KB
-
MD5
99ea1ce1d4123a7538e0810d2bb919b8
-
SHA1
ec8ee7dc4ea3ce0045f1a6569b945f586aeaf7cf
-
SHA256
f6f06d960291d57697aaba85675aad68e6c677b91ef42d1a04ad84a3e9b54a30
-
SHA512
210cf92fc65479b91a2874b60b14bf599a356a392c066f41501d571e8182fc2eb938217be20fdf6196d7cb20e53bb90698509b2c16c7e5c0ad630aa930cb939b
-
SSDEEP
1536:y54izQ6VsYh/t5MKvJIp4LkWnwK7mMcAtRwK9t:yRzQ6V1/vVld
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1