Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Dekont.exe

  • Size

    694KB

  • Sample

    200716-9x2yjb78m2

  • MD5

    9e8bd6819de523a6012332c81f2b84e0

  • SHA1

    af4b5ba18445366f1afa7e4c67ea7a1c9382b48e

  • SHA256

    01da17c9c2c55ea880f5f2d1d1b845d2f534b8fe411bc2ad18e4dba6e24a292f

  • SHA512

    1688ff174fd080a820c58ab9d7a0e667f457d80c2a74c76ae0f37f92dfcff2e1a9b7c313e165ea441160d5a1ca01ec4ad031bdc552afef5e590fcb93240493b8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.decoplanet.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ayla1939

Targets

    • Target

      Dekont.exe

    • Size

      694KB

    • MD5

      9e8bd6819de523a6012332c81f2b84e0

    • SHA1

      af4b5ba18445366f1afa7e4c67ea7a1c9382b48e

    • SHA256

      01da17c9c2c55ea880f5f2d1d1b845d2f534b8fe411bc2ad18e4dba6e24a292f

    • SHA512

      1688ff174fd080a820c58ab9d7a0e667f457d80c2a74c76ae0f37f92dfcff2e1a9b7c313e165ea441160d5a1ca01ec4ad031bdc552afef5e590fcb93240493b8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks