General

  • Target

    Enquiry.js

  • Size

    319KB

  • Sample

    240923-q489gaxgrn

  • MD5

    9234f26f1ef7e053de47d6b1e4e02827

  • SHA1

    f110e7a8c7d4b65491be0393ead6bc9c9620bef0

  • SHA256

    9446ab8aeba470c63142ab986f9023bf8b1a786baea6ff43ceaf3d945e9c8976

  • SHA512

    62091b83f6feda8f7cff0655149a3c2d6d7c4203b1064f52f670ffd759d0ce97ca243a87084b6f6fe2be96a8576d57488795844202c5210e577899e341225c7e

  • SSDEEP

    6144:zze4Z2bN0IWqH8dEHLQp57QBH/8vGwp749Og3JWacMnmockYAOkrW9vvplZcF:e4Z2bN0gH8irQp5EBf8vGwp74AgJ4qm6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.detarcoopmedical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    To$zL%?nhDHN

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Enquiry.js

    • Size

      319KB

    • MD5

      9234f26f1ef7e053de47d6b1e4e02827

    • SHA1

      f110e7a8c7d4b65491be0393ead6bc9c9620bef0

    • SHA256

      9446ab8aeba470c63142ab986f9023bf8b1a786baea6ff43ceaf3d945e9c8976

    • SHA512

      62091b83f6feda8f7cff0655149a3c2d6d7c4203b1064f52f670ffd759d0ce97ca243a87084b6f6fe2be96a8576d57488795844202c5210e577899e341225c7e

    • SSDEEP

      6144:zze4Z2bN0IWqH8dEHLQp57QBH/8vGwp749Og3JWacMnmockYAOkrW9vvplZcF:e4Z2bN0gH8irQp5EBf8vGwp74AgJ4qm6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks