General

  • Target

    228256bcfebb67586f77a39f116251815bf29a78a2d2a1370016455b9b090457.js

  • Size

    320KB

  • Sample

    240920-bjyjxa1fpp

  • MD5

    b54f5c7cb5ac3d69127941e40966ab0c

  • SHA1

    c75973c8bee061c5e4994e2e9da6ebb830719e31

  • SHA256

    228256bcfebb67586f77a39f116251815bf29a78a2d2a1370016455b9b090457

  • SHA512

    26b0b14d52ed23906448121c2078e032fda790df95cd27c49a888fba3b17f725d494fc89298a6a99e795faa594de1ea4739a113331129bc3395f22a387f53987

  • SSDEEP

    6144:6Xx8rS9pLPEFSkgJisDKPdGuoKeM4k6iPrjt5DiqVAo2JIF1wS8TeBVDm6T3ViZ5:wx2spLPEFSkUisDKVA5k6arjLDi2PmCC

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      228256bcfebb67586f77a39f116251815bf29a78a2d2a1370016455b9b090457.js

    • Size

      320KB

    • MD5

      b54f5c7cb5ac3d69127941e40966ab0c

    • SHA1

      c75973c8bee061c5e4994e2e9da6ebb830719e31

    • SHA256

      228256bcfebb67586f77a39f116251815bf29a78a2d2a1370016455b9b090457

    • SHA512

      26b0b14d52ed23906448121c2078e032fda790df95cd27c49a888fba3b17f725d494fc89298a6a99e795faa594de1ea4739a113331129bc3395f22a387f53987

    • SSDEEP

      6144:6Xx8rS9pLPEFSkgJisDKPdGuoKeM4k6iPrjt5DiqVAo2JIF1wS8TeBVDm6T3ViZ5:wx2spLPEFSkUisDKVA5k6arjLDi2PmCC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks