Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2f2238ba20cda49017c3d861729bbcde2143576afab80b5a2e4b3476bd2ca1fc_JC.exe

  • Size

    569KB

  • Sample

    230815-srnhcadc7t

  • MD5

    90cea9c35fae7da6410dde2645820bb8

  • SHA1

    386c09c10ec8aa533a72fc82701e78e46dc0e8f5

  • SHA256

    2f2238ba20cda49017c3d861729bbcde2143576afab80b5a2e4b3476bd2ca1fc

  • SHA512

    801be8b1cdca4ff9f43e09e3cdef733c231a4bae77df07481e4f90bb95c85d0caf890bcd8652f1654c4ab991db7d4a44f9410b1de0ebbab3f5cb256d8dce4f9e

  • SSDEEP

    12288:Mb4lrrF1AyqVeCNrRzW+0hgr2zmRt/vq/ffq8z3Kv:Mb4lXF12YCRRzW+0ha2zmRtq/R3Kv

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://valvulasthermovalve.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    LILKOOLL14!!

Targets

    • Target

      2f2238ba20cda49017c3d861729bbcde2143576afab80b5a2e4b3476bd2ca1fc_JC.exe

    • Size

      569KB

    • MD5

      90cea9c35fae7da6410dde2645820bb8

    • SHA1

      386c09c10ec8aa533a72fc82701e78e46dc0e8f5

    • SHA256

      2f2238ba20cda49017c3d861729bbcde2143576afab80b5a2e4b3476bd2ca1fc

    • SHA512

      801be8b1cdca4ff9f43e09e3cdef733c231a4bae77df07481e4f90bb95c85d0caf890bcd8652f1654c4ab991db7d4a44f9410b1de0ebbab3f5cb256d8dce4f9e

    • SSDEEP

      12288:Mb4lrrF1AyqVeCNrRzW+0hgr2zmRt/vq/ffq8z3Kv:Mb4lXF12YCRRzW+0ha2zmRtq/R3Kv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks