Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee.exe
-
Size
681KB
-
Sample
231126-qnf8rahe87
-
MD5
90b792cf86d9afd7bbd1f48e5dc43cb4
-
SHA1
10205a12730a7a0e8c6cfbeda590513e6162acf0
-
SHA256
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee
-
SHA512
a7ea940f8720fef323ff302d73ad677149fb42ac0a188e15cb26c6e202a203de934b1f5a2bcbee7e336cbdd71893dd9e0269e1aa83265d8ee6673f56f164952b
-
SSDEEP
12288:7WE6jD/BFpk1ZzjJ4MrZ+UTuyRPFebWEbh2CKhdYpuUeAENz4:qtD/TOzJ4MrZ+5+eWEbhpK36uUXEN
Static task
static1
Behavioral task
behavioral1
Sample
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amtechcards.com - Port:
587 - Username:
[email protected] - Password:
]i[a(tUWlmp% - Email To:
[email protected]
Targets
-
-
Target
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee.exe
-
Size
681KB
-
MD5
90b792cf86d9afd7bbd1f48e5dc43cb4
-
SHA1
10205a12730a7a0e8c6cfbeda590513e6162acf0
-
SHA256
0f3ff1ded6ea1d1f1f99e20142508697e403253eeb8323a18476ff46847b22ee
-
SHA512
a7ea940f8720fef323ff302d73ad677149fb42ac0a188e15cb26c6e202a203de934b1f5a2bcbee7e336cbdd71893dd9e0269e1aa83265d8ee6673f56f164952b
-
SSDEEP
12288:7WE6jD/BFpk1ZzjJ4MrZ+UTuyRPFebWEbh2CKhdYpuUeAENz4:qtD/TOzJ4MrZ+5+eWEbhpK36uUXEN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-