General

  • Target

    Request For Quotation.js

  • Size

    131KB

  • Sample

    241007-fxkx7a1hlh

  • MD5

    55f3ba85c0e1546b907ec0f2465f6bac

  • SHA1

    59c6d5157b6cb30040f0226599c99f07c361f822

  • SHA256

    c35922ffe621f1719e7346a3fa7ba779766c44481ed2ad785782cc7bf693376c

  • SHA512

    478496891e630b260802e97f20132adf1b06b22f35b059e9f9176e6e5f777d63184b45c32efbf4981f53f02ecff31640e84661164a90d550a1d061e1edde3d1b

  • SSDEEP

    3072:/N+oukZXE8KRI4V1AulQkcunvyhLZm2MKIvgzJJY6N+oukZXE8KRI4V1AulQkcuz:/xukZ08baeulQ/uni/M5vgzXY6xukZ07

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.detarcoopmedical.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    To$zL%?nhDHN

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Request For Quotation.js

    • Size

      131KB

    • MD5

      55f3ba85c0e1546b907ec0f2465f6bac

    • SHA1

      59c6d5157b6cb30040f0226599c99f07c361f822

    • SHA256

      c35922ffe621f1719e7346a3fa7ba779766c44481ed2ad785782cc7bf693376c

    • SHA512

      478496891e630b260802e97f20132adf1b06b22f35b059e9f9176e6e5f777d63184b45c32efbf4981f53f02ecff31640e84661164a90d550a1d061e1edde3d1b

    • SSDEEP

      3072:/N+oukZXE8KRI4V1AulQkcunvyhLZm2MKIvgzJJY6N+oukZXE8KRI4V1AulQkcuz:/xukZ08baeulQ/uni/M5vgzXY6xukZ07

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks