Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Please confirm your shipment address.exe
-
Size
1.1MB
-
Sample
200716-zkcsb8htae
-
MD5
fd67f2468786ab7a02d00e3abe4ed5ac
-
SHA1
6f2119bdfea341acce131f9dab6479b68fb622cd
-
SHA256
1bd7fcf59176999d49faee562f699d840b4c1dd697055fa66e6a52c0846a9b42
-
SHA512
714653f371643e86a4ab80e8183167409bc8e65b5386e87ca3fc3e6b6a96a822d27aca58dc2e4231ebf87ea75bd48eeadc0e4357fbdd31279ec6295a7275c7a4
Static task
static1
Behavioral task
behavioral1
Sample
Please confirm your shipment address.exe
Resource
win7
Behavioral task
behavioral2
Sample
Please confirm your shipment address.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
mmm777
Targets
-
-
Target
Please confirm your shipment address.exe
-
Size
1.1MB
-
MD5
fd67f2468786ab7a02d00e3abe4ed5ac
-
SHA1
6f2119bdfea341acce131f9dab6479b68fb622cd
-
SHA256
1bd7fcf59176999d49faee562f699d840b4c1dd697055fa66e6a52c0846a9b42
-
SHA512
714653f371643e86a4ab80e8183167409bc8e65b5386e87ca3fc3e6b6a96a822d27aca58dc2e4231ebf87ea75bd48eeadc0e4357fbdd31279ec6295a7275c7a4
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops file in Drivers directory
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-