Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Especificación Cotización_DOC6467.exe

  • Size

    1.2MB

  • Sample

    230830-he8yeaac22

  • MD5

    39c65129bc2e871b8a7d09a31ceebb4b

  • SHA1

    022d2c610c09c1b76626f1f7a0fdc6f199f94ffe

  • SHA256

    0eb744ee1a95301432e7b9af6a3e4e67b18a02cb55baccf9c1a88b6aee906545

  • SHA512

    f64125f54ebd085c3d204a20f14422be764a179dd9dc2fb5da8c021256282ec032bc6291bcf7f43ccb6e2609d2db90ff354b5203b19d3e381167446a42584d55

  • SSDEEP

    24576:NTbBv5rUanfOOyeXEfqGOGleTM4WBGa6mXcqIAXiDFWmhHpa81yB:HBjf4rfqFVpLAXicQHg80

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mqils.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    +PT}MwwP2un&

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Especificación Cotización_DOC6467.exe

    • Size

      1.2MB

    • MD5

      39c65129bc2e871b8a7d09a31ceebb4b

    • SHA1

      022d2c610c09c1b76626f1f7a0fdc6f199f94ffe

    • SHA256

      0eb744ee1a95301432e7b9af6a3e4e67b18a02cb55baccf9c1a88b6aee906545

    • SHA512

      f64125f54ebd085c3d204a20f14422be764a179dd9dc2fb5da8c021256282ec032bc6291bcf7f43ccb6e2609d2db90ff354b5203b19d3e381167446a42584d55

    • SSDEEP

      24576:NTbBv5rUanfOOyeXEfqGOGleTM4WBGa6mXcqIAXiDFWmhHpa81yB:HBjf4rfqFVpLAXicQHg80

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Suspicious Office macro

      Office document equipped with macros.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks