General
-
Target
17052025_1325_Invoice Copy.js.zip
-
Size
3KB
-
Sample
250517-qpefjsgj8y
-
MD5
c50e1a3bfe79001dbe285b6cfc8fe943
-
SHA1
ff6c58da2cf6edcd9d0123dc3c0e28ae2266fb23
-
SHA256
0a2f2c285c3497fc5860512279559c87f0f0c551067d0b640a242c6ca7e4f033
-
SHA512
5dfb0a0d0ce534d0f2e39c4994c4fc8df2311cad9014c6155adb246ad42116280640bfc6f3c8c22ef24fb48dacef17a65ca372bb507e47aca454d6ed58cfda1f
Static task
static1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.detarcoopmedical.com - Port:
587 - Username:
[email protected] - Password:
To$zL%?nhDHN - Email To:
[email protected]
Targets
-
-
Target
Invoice Copy.js
-
Size
137KB
-
MD5
51473b164b51a41ba4e8245ee14cf698
-
SHA1
431be94afedff3277858c9aec1f1fc34ef82807d
-
SHA256
8198ace97c6f91caec9cfcad79c2c290d826b5380cca1f70f6c32b2a36d6b86e
-
SHA512
026e19d21fd33f249106eba2c4c5d3b641b5db7da6d6cd5653e124f290e87cb02232570e0d06b4825e00d62cd8777600fc02d0098c284d3bec9a84280f2ed3e8
-
SSDEEP
384:xgR0tGuQWuRTxxp7tivHtuAQiQTetXaxXrTj/k8qUeywtTkUC9aCDQPtgek8a5tb:Teh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-