Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Servo purchase Order.exe

  • Size

    308KB

  • Sample

    230301-mz2gaafd7w

  • MD5

    b7e5714c9266e7852db0d529c14922ec

  • SHA1

    db34aa46af23c3f2b7a2d72765548bb39d2f18f7

  • SHA256

    2de86403327aa376007b509984b68b8bde19279366e80aed50d39593cd495769

  • SHA512

    2e95fdd96c98d33b8dd3bdeba2782368c8674482c2d912c62fa6323a56e65c0abe61f93b7dc168d2a15459dc65bb5b8761ba55eeb3b3bdee5b8c5915889b392e

  • SSDEEP

    6144:PYa6qlmwy1hmtJ1Xim4Ijqgq+52wOGSx7M9W8z6WFsUAvbLBxYV85r3b:PYMHy1Ety5IjJq+56FcW8zDFe3BxL5rr

Malware Config

Targets

    • Target

      Servo purchase Order.exe

    • Size

      308KB

    • MD5

      b7e5714c9266e7852db0d529c14922ec

    • SHA1

      db34aa46af23c3f2b7a2d72765548bb39d2f18f7

    • SHA256

      2de86403327aa376007b509984b68b8bde19279366e80aed50d39593cd495769

    • SHA512

      2e95fdd96c98d33b8dd3bdeba2782368c8674482c2d912c62fa6323a56e65c0abe61f93b7dc168d2a15459dc65bb5b8761ba55eeb3b3bdee5b8c5915889b392e

    • SSDEEP

      6144:PYa6qlmwy1hmtJ1Xim4Ijqgq+52wOGSx7M9W8z6WFsUAvbLBxYV85r3b:PYMHy1Ety5IjJq+56FcW8zDFe3BxL5rr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks