General

  • Target

    Quote_Request.js

  • Size

    320KB

  • Sample

    240923-q48yps1fkb

  • MD5

    409a098455597d7cbc0c56bc2d37f4b5

  • SHA1

    b46f9a53e7fe7ce357a2a4b8d0e0949da320aeea

  • SHA256

    21f90e0d5e6ecb036950ec462cd6eed6b17b1a231a6220fbc1dda80c118f8b1f

  • SHA512

    9709d7ca61ea365fbb2612cea61b2fcb8e4f45af4bd98caf5900ee26ec855cc5b43158073933ebf09f6e78f472c617ccbbe77ea9b235311c7be4aa7b04e71ba7

  • SSDEEP

    6144:c5VUO+uOGvqHKB+X/AUVUFCiaiYQAjOZLzDrQI2e6tYppEQNCo0jV92z6IqWm+W+:075OGvqHKIYU6FCia3QkOVzoIymnxCRu

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.detarcoopmedical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    To$zL%?nhDHN

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Quote_Request.js

    • Size

      320KB

    • MD5

      409a098455597d7cbc0c56bc2d37f4b5

    • SHA1

      b46f9a53e7fe7ce357a2a4b8d0e0949da320aeea

    • SHA256

      21f90e0d5e6ecb036950ec462cd6eed6b17b1a231a6220fbc1dda80c118f8b1f

    • SHA512

      9709d7ca61ea365fbb2612cea61b2fcb8e4f45af4bd98caf5900ee26ec855cc5b43158073933ebf09f6e78f472c617ccbbe77ea9b235311c7be4aa7b04e71ba7

    • SSDEEP

      6144:c5VUO+uOGvqHKB+X/AUVUFCiaiYQAjOZLzDrQI2e6tYppEQNCo0jV92z6IqWm+W+:075OGvqHKIYU6FCia3QkOVzoIymnxCRu

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks