General

  • Target

    17052025_1325_Invoice Copy.js.zip

  • Size

    3KB

  • Sample

    250517-qpefjsgj8y

  • MD5

    c50e1a3bfe79001dbe285b6cfc8fe943

  • SHA1

    ff6c58da2cf6edcd9d0123dc3c0e28ae2266fb23

  • SHA256

    0a2f2c285c3497fc5860512279559c87f0f0c551067d0b640a242c6ca7e4f033

  • SHA512

    5dfb0a0d0ce534d0f2e39c4994c4fc8df2311cad9014c6155adb246ad42116280640bfc6f3c8c22ef24fb48dacef17a65ca372bb507e47aca454d6ed58cfda1f

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Invoice Copy.js

    • Size

      137KB

    • MD5

      51473b164b51a41ba4e8245ee14cf698

    • SHA1

      431be94afedff3277858c9aec1f1fc34ef82807d

    • SHA256

      8198ace97c6f91caec9cfcad79c2c290d826b5380cca1f70f6c32b2a36d6b86e

    • SHA512

      026e19d21fd33f249106eba2c4c5d3b641b5db7da6d6cd5653e124f290e87cb02232570e0d06b4825e00d62cd8777600fc02d0098c284d3bec9a84280f2ed3e8

    • SSDEEP

      384:xgR0tGuQWuRTxxp7tivHtuAQiQTetXaxXrTj/k8qUeywtTkUC9aCDQPtgek8a5tb:Teh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »