Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Doc01201763000.exe
-
Size
2.9MB
-
Sample
221007-lvgqmscba9
-
MD5
6bdc2941aadda12fde04af72c227eadd
-
SHA1
7ad28b6c109ae7ad534c3bef4664f4a5c4ff6310
-
SHA256
6b4ae1bde5c68bdc96647dc1154eeea23eda290a970f8ddd9991a67337ab3689
-
SHA512
47263631a93396d7f39257fc23a8fad7e48d3c2e37d75015b6de08c879ce78b10fe63cfc9e99733ef039bb4b22cf0e57a33f6e49ef2349d450f00a5cad4c3328
-
SSDEEP
24576:bqri8YEiqPPnGIR4bYjQqeCAWqaRyMyV3rRP0rioqOnYQb6VOk9Zv8qAgq:
Static task
static1
Behavioral task
behavioral1
Sample
Doc01201763000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Doc01201763000.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
rze6.sytes.net:5000
QSR_MUTEX_nHkW3jdEs5SeHvgyZi
-
encryption_key
sweOMvDPhbI7lawcCiiU
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
agenttesla
http://195.178.120.72/ch1t/inc/c20966a2dd74ab.php
Targets
-
-
Target
Doc01201763000.exe
-
Size
2.9MB
-
MD5
6bdc2941aadda12fde04af72c227eadd
-
SHA1
7ad28b6c109ae7ad534c3bef4664f4a5c4ff6310
-
SHA256
6b4ae1bde5c68bdc96647dc1154eeea23eda290a970f8ddd9991a67337ab3689
-
SHA512
47263631a93396d7f39257fc23a8fad7e48d3c2e37d75015b6de08c879ce78b10fe63cfc9e99733ef039bb4b22cf0e57a33f6e49ef2349d450f00a5cad4c3328
-
SSDEEP
24576:bqri8YEiqPPnGIR4bYjQqeCAWqaRyMyV3rRP0rioqOnYQb6VOk9Zv8qAgq:
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-