Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Payment_Advice02052023_PDF.doc

  • Size

    29KB

  • Sample

    230503-m9arbagc9s

  • MD5

    a0036c0ddc5e446bb58859bbf3dc82bf

  • SHA1

    3e81bfb875f7cf81e61358a8559e14880103ddd6

  • SHA256

    a18cddd93f3a184dea5e873c393fa88b9002d4e23fa4725360f7333b4a8da51c

  • SHA512

    053582a4f6c54c454a9ae815ab21d8d326b418c0f86b45373e8b3ece1008e8dd0914ad4269df5b5456ce6610c7cdcfcaace86751937e3a6f1caf41e0a1631c71

  • SSDEEP

    768:tFx0XaIsnPRIa4fwJMJjO/O2+SHWaC3N0Fr:tf0Xvx3EM9R2DHA3N0Fr

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5350270151:AAHiqzi7CQnEGEk3Xi-PyJX8ov0x6B-8S1I/

Targets

    • Target

      Payment_Advice02052023_PDF.doc

    • Size

      29KB

    • MD5

      a0036c0ddc5e446bb58859bbf3dc82bf

    • SHA1

      3e81bfb875f7cf81e61358a8559e14880103ddd6

    • SHA256

      a18cddd93f3a184dea5e873c393fa88b9002d4e23fa4725360f7333b4a8da51c

    • SHA512

      053582a4f6c54c454a9ae815ab21d8d326b418c0f86b45373e8b3ece1008e8dd0914ad4269df5b5456ce6610c7cdcfcaace86751937e3a6f1caf41e0a1631c71

    • SSDEEP

      768:tFx0XaIsnPRIa4fwJMJjO/O2+SHWaC3N0Fr:tf0Xvx3EM9R2DHA3N0Fr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks