Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    b607b2473faa3921a2e7e9e764199825.bin

  • Size

    512KB

  • Sample

    230701-b2tcxafc58

  • MD5

    62808ca5f4f85b9c7e2af1c5b26910e8

  • SHA1

    132f556d2a9f271c8b9cf9e9a698f28e60482c9b

  • SHA256

    4342268e20e45f48d11185087ec4fc4d096facc2a6848bf44109f2c02402cbbb

  • SHA512

    4f744f76be98dcda8e384c7c1bc93e21af2625f3ffe49466a38b1415a00f56cccbc7be94f90a183d5df836e5e78906690918482511f306403e8bdc2e96371cb5

  • SSDEEP

    12288:mVvUSz32/h4cvATUM+Srp59Od18u53NwmtGXdXZ/g7:mpn32/h40M+SF2r8u53NwXG

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA#266203.exe

    • Size

      642KB

    • MD5

      2e491b57220c06760d227b5197175393

    • SHA1

      479e6216f205cb33f4f9c7ed53b95112ae119ade

    • SHA256

      6673285a97d7ef391c811a7372c1033ce8f117f8f15702782461ff4737636ce8

    • SHA512

      0099fabd4701d02e1a1b16f49985d6cb71e72d9c4a2c8dab04ad96c48552a40499b828c488015cd52ef09be35ca80db6f380b3ab829c132e4ba9f03fc60d975d

    • SSDEEP

      12288:s5dPG2fo/oq507+FjSm9p/7kAtDrjpgcunDdp3QIWySxV1:Uo07+8mj/tnjqcIhp3QIFu1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks