General

  • Target

    c1b0f76c74aaf127f4692ae32f5d7948a48e83c235849c9dcd1c886306046aff

  • Size

    44KB

  • Sample

    241011-tqc6nawepn

  • MD5

    43a649f3e5d95cf8e7dcdb0dc0257d46

  • SHA1

    5fb00d6975cd5eeb5d7e3a48ee3667e301e6ab7c

  • SHA256

    c1b0f76c74aaf127f4692ae32f5d7948a48e83c235849c9dcd1c886306046aff

  • SHA512

    bfa077685dac63d99de09629ad43707fd97cff812a74e68403eed077c5133d672b25335b67f5885b4a6ba34b33912d9ecbd86651d8cb5451ca933a1c47997aef

  • SSDEEP

    768:oWwXsdCbIcnJ9cuXa1lRw/2MrMd5ZkSnEBOSkdCeZRf8R7MsV3siEu/RtLQmnuBl:ot84ZnJKuXa17dkMsBtkBRkes5sZuzuv

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_J.jpg%20

exe.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_J.jpg%20

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ctdi.com.ph
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    A#f+Y]H8iO4a

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Purchase Order No. 4500017624.js

    • Size

      133KB

    • MD5

      75620fc98dd7d233cd0aa29c32cf9d44

    • SHA1

      27601368bea910a9e9af5685a2d746397e9fbf75

    • SHA256

      3696b50af7b213dbb488178e4202096f3efc1e0c9f6f3b8d48e47799d49537f6

    • SHA512

      5db62a0f483a14c7f05e58a3725db887e09c6326ff34e927258f73350156f7241ee6ea9222e5aae03ce14bc0934644044e83e74111e9c78d35817a0a5dee8ea7

    • SSDEEP

      3072:3PQ4Hk0LdPdossHOLxD8i5inyBLPqZBC9Tf5PQ4Hk0LdPH:YUdPdljTfiUdPH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks