Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Proforma invoice_pdf.exe

  • Size

    1016KB

  • Sample

    230106-wmfhqahe33

  • MD5

    65952e6521043c913df7baa481b6fe30

  • SHA1

    81345f3e07ebf087d2dc01d1370f8920855b17c8

  • SHA256

    7725d7b433b154bd610e8bc940c3aac2c874901fe65a07ebe4289e5b133493f3

  • SHA512

    d893346d1a1508dc012e9442c63bfc4c3ae881d93f15171462f4323de6251a10c72c4ef649c52b372aae2ecd7ff48051ec1c38cf01fb1b7175f9fbe416a3b385

  • SSDEEP

    24576:rrx3K9ZTjDwTdj8R5Bs2BNZGhPK9v5qntI2EOc/Hf8xK:xeRDwTB+jBNZGhPq5q62goK

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.huiijingco.com
  • Port:
    587
  • Username:
    m@huiijingco.com
  • Password:
    lNLUrZT2

Targets

    • Target

      Proforma invoice_pdf.exe

    • Size

      1016KB

    • MD5

      65952e6521043c913df7baa481b6fe30

    • SHA1

      81345f3e07ebf087d2dc01d1370f8920855b17c8

    • SHA256

      7725d7b433b154bd610e8bc940c3aac2c874901fe65a07ebe4289e5b133493f3

    • SHA512

      d893346d1a1508dc012e9442c63bfc4c3ae881d93f15171462f4323de6251a10c72c4ef649c52b372aae2ecd7ff48051ec1c38cf01fb1b7175f9fbe416a3b385

    • SSDEEP

      24576:rrx3K9ZTjDwTdj8R5Bs2BNZGhPK9v5qntI2EOc/Hf8xK:xeRDwTB+jBNZGhPq5q62goK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.