General

  • Target

    943869c0fd11cfbfdbf3ba902377e1470be12c94a9f2d49c952a14a9700552b0.js

  • Size

    75KB

  • Sample

    241220-e7mdbs1jdq

  • MD5

    2e461076f6618e8f34ac4ada5bcc55fd

  • SHA1

    343a6c8b272ee7c261c9a3fb1eda91f769cc18ed

  • SHA256

    943869c0fd11cfbfdbf3ba902377e1470be12c94a9f2d49c952a14a9700552b0

  • SHA512

    c4d0fc5f78321824c32493491cf0e29bb50a24294eb08e6934d206e4adeaa1aa1f7ddc2f443fe5e4ba9bb8d534443af61e9bdb8578573c66ab2f2b754d599985

  • SSDEEP

    1536:8Z4xzQ6VsYE/D5OK1hoFPqd50a+X7psEBCCB29f+JrdWXOUPmMcA9KBwbBs:8SzQ6Vo/9RzY

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ctdi.com.ph
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    A#f+Y]H8iO4a

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      943869c0fd11cfbfdbf3ba902377e1470be12c94a9f2d49c952a14a9700552b0.js

    • Size

      75KB

    • MD5

      2e461076f6618e8f34ac4ada5bcc55fd

    • SHA1

      343a6c8b272ee7c261c9a3fb1eda91f769cc18ed

    • SHA256

      943869c0fd11cfbfdbf3ba902377e1470be12c94a9f2d49c952a14a9700552b0

    • SHA512

      c4d0fc5f78321824c32493491cf0e29bb50a24294eb08e6934d206e4adeaa1aa1f7ddc2f443fe5e4ba9bb8d534443af61e9bdb8578573c66ab2f2b754d599985

    • SSDEEP

      1536:8Z4xzQ6VsYE/D5OK1hoFPqd50a+X7psEBCCB29f+JrdWXOUPmMcA9KBwbBs:8SzQ6Vo/9RzY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks