This sample is a heavily obfuscated JScript/JavaScript dropper (WSH-compatible) that serves as the initial stage of an AgentTesla credential-stealing campaign. Upon execution via Windows Script Host (wscript.exe), the script downloads a second-stage PowerShell payload (SweetWhnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnore.ps1) from a Firebase Storage bucket (newmarch-a5a44.firebasestorage.app), drops it to C:\Temp\ under a randomly generated filename, and launches it with execution-policy bypass flags. The script employs sophisticated obfuscation including string array indirection, index-offset arithmetic, control-flow flattening, and an embedded ReDoS anti-debugging pattern. The use of legitimate Google Firebase infrastructure for payload staging is a common living-off-the-land network technique to evade domain-reputation and proxy controls. VirusTotal detection stands at 14/76 as of first submission, with Fortinet classifying it specifically as JS/Formbook.ADXY!tr.dldr.
The sample is a single-line, heavily obfuscated JScript file (no line terminators). It is compatible with Windows Script Host (wscript.exe / cscript.exe) and uses the legacy WSH ActiveX COM model.
Obfuscation Techniques
Technique
Description
String Array Obfuscation
All 365 string literals stored in central n() function returning array XX[]
Index Arithmetic
String lookup function p(V,E) uses V - 0x172 as index into the string array
Multiple Lookup Functions
~50 aliased string-lookup variants (ES, EW, EK, Ej, Eg, etc.) all pointing to p()
Control Flow Flattening
Switch-case state machines with randomized case ordering (e.g., '6|1|2|3|0', '4|2|0|3|5')
IIFE Wrappers
Multiple self-invoking anonymous function closures
Anti-Debugging (ReDoS)
Embeds RegEx pattern (((.+)+)+ — a known ReDoS canary used to detect debugger slow-down
Function Name Obfuscation
All identifiers use 1–2 character non-descriptive names
Dead Code / Junk
Spurious branching and unused variables interspersed throughout
Infrastructure: Attacker created Firebase project newmarch-a5a44 for payload staging — a growing trend in commodity malware campaigns to abuse free cloud storage (Firebase, Dropbox, OneDrive, Pastebin) to bypass URL filtering
Payload: The second-stage SweetWhnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnore.ps1 is consistent with AgentTesla PS1 loaders that typically download and execute the final .NET AgentTesla binary, which performs keylogging, screenshot capture, credential theft from browsers/email clients, and exfiltrates via SMTP/FTP
Attribution: No specific threat actor attributed; campaign consistent with commodity cybercrime (AgentTesla is widely available as MaaS)
Obfuscation Tool: The obfuscation pattern (string array + index arithmetic + IIFE wrappers) is characteristic of obfuscator.io or similar JavaScript obfuscation services commonly used in JS dropper campaigns