General
-
Target
05f1bfad1052e82ed6fc8d3348ea86f1958b8d8f39d331967edba843ce1214f7.vbs
-
Size
500KB
-
Sample
241002-dwb8jsvbrn
-
MD5
5b4a21e35cce386f8692a4a5d684cb14
-
SHA1
38cefdde89a5577f3d89396afd6fc15c8f89200e
-
SHA256
05f1bfad1052e82ed6fc8d3348ea86f1958b8d8f39d331967edba843ce1214f7
-
SHA512
94543f5006c02fe0df66d9c6517831bc7afa22336372d2f87de1f0d21028b5d228850fe4d03e9c8721d4fb4e44d34c711a21a7abf35e1268f1293daab07b30b2
-
SSDEEP
12288:Ppg9Y9TU6WMHM8GjqgjuLlXxp7kuqXZqDpw20ADLlpfMom6av1o0pLtxoo/Obx5X:GUsZkfqezIZy30W7
Static task
static1
Behavioral task
behavioral1
Sample
05f1bfad1052e82ed6fc8d3348ea86f1958b8d8f39d331967edba843ce1214f7.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
Extracted
Protocol: smtp- Host:
mail.detarcoopmedical.com - Port:
587 - Username:
[email protected] - Password:
To$zL%?nhDHN
Extracted
agenttesla
Protocol: smtp- Host:
mail.detarcoopmedical.com - Port:
587 - Username:
[email protected] - Password:
To$zL%?nhDHN - Email To:
[email protected]
Targets
-
-
Target
05f1bfad1052e82ed6fc8d3348ea86f1958b8d8f39d331967edba843ce1214f7.vbs
-
Size
500KB
-
MD5
5b4a21e35cce386f8692a4a5d684cb14
-
SHA1
38cefdde89a5577f3d89396afd6fc15c8f89200e
-
SHA256
05f1bfad1052e82ed6fc8d3348ea86f1958b8d8f39d331967edba843ce1214f7
-
SHA512
94543f5006c02fe0df66d9c6517831bc7afa22336372d2f87de1f0d21028b5d228850fe4d03e9c8721d4fb4e44d34c711a21a7abf35e1268f1293daab07b30b2
-
SSDEEP
12288:Ppg9Y9TU6WMHM8GjqgjuLlXxp7kuqXZqDpw20ADLlpfMom6av1o0pLtxoo/Obx5X:GUsZkfqezIZy30W7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-