General

  • Target

    scan_374783.js

  • Size

    3KB

  • Sample

    241007-rfdy4asgjc

  • MD5

    c6b0c8c717d6f6b0fc0747c349821280

  • SHA1

    e7b0686c4eebc8285ae5a2eb2c70a602b451b0d6

  • SHA256

    9eb68fe0683e79b88e4b37a2b038336192b516c5f975bf8636dc1565432bbdbc

  • SHA512

    434a2c6fe2ff42715e1ea6807e37d40852aab4ce0cac8af7ddd52327f503c72eb5544f221c15080b341942f6a79b9279679dbb04fa8216e2d5616c53df0fcac7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt

exe.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Targets

    • Target

      scan_374783.js

    • Size

      3KB

    • MD5

      c6b0c8c717d6f6b0fc0747c349821280

    • SHA1

      e7b0686c4eebc8285ae5a2eb2c70a602b451b0d6

    • SHA256

      9eb68fe0683e79b88e4b37a2b038336192b516c5f975bf8636dc1565432bbdbc

    • SHA512

      434a2c6fe2ff42715e1ea6807e37d40852aab4ce0cac8af7ddd52327f503c72eb5544f221c15080b341942f6a79b9279679dbb04fa8216e2d5616c53df0fcac7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks