General

  • Target

    https://cdn.discordapp.com/attachments/1240773040221196319/1242622210988838922/Purchase.js?ex=664e819d&is=664d301d&hm=9831c346d913e255806aeb7c08f8a43cde2fe4bccbad9a77bf74f9f9d6e22e9e&

  • Sample

    240522-k3eqksac81

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      https://cdn.discordapp.com/attachments/1240773040221196319/1242622210988838922/Purchase.js?ex=664e819d&is=664d301d&hm=9831c346d913e255806aeb7c08f8a43cde2fe4bccbad9a77bf74f9f9d6e22e9e&

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks