General

  • Target

    https://cdn.discordapp.com/attachments/1268301344624611473/1286423055559819274/QUOTE_REQUEST_HONG_KONG_CHEMHERE.js?ex=66edda55&is=66ec88d5&hm=6c684c87631ff3310752d49a8867cf9d4b9e17508ca566ea7d6ab8a979b14b43&

  • Sample

    240920-a4cmhazgnn

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.detarcoopmedical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    To$zL%?nhDHN

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      https://cdn.discordapp.com/attachments/1268301344624611473/1286423055559819274/QUOTE_REQUEST_HONG_KONG_CHEMHERE.js?ex=66edda55&is=66ec88d5&hm=6c684c87631ff3310752d49a8867cf9d4b9e17508ca566ea7d6ab8a979b14b43&

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks