Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Dekont-08-22-23-745469873098789878987678987987.DOC.7z

  • Size

    622KB

  • Sample

    240108-wf16vafdh5

  • MD5

    bb4b5d96fc625ca10fa3ecb64418e58c

  • SHA1

    d884f57e6772001bb8ddb5a20b80a8af97f1de6b

  • SHA256

    06ab08fdf6ceb0fa8b5727125434b3d1096522b31a7d2aa13e82138927f78632

  • SHA512

    0c38873b921591da54e6600293ae7b71bdccf7494eaf53aea2e27d00f75d8185fa08c38f5e665986aa6e9792db5a552806719d27e77b86c4d1c04a20cd6a3def

  • SSDEEP

    12288:qWmkYRyx8ZV51VqA2wzXUqgyukI+aELMCrpnEqLI5wc4sdbXsGQiA9omKsOzOO84:qWm7yeDxjzEqNuf+aCrBdI57H69oVsDg

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Targets

    • Target

      Dekont-08-22-23-745469873098789878987678987987.DOC.exe

    • Size

      666KB

    • MD5

      3655f4dbfd555dcf3ae7be88e4dcc132

    • SHA1

      b678e4d2866c5bfe112b3c7b7b5edab96159db8f

    • SHA256

      5808dc380418fc0add23fdcd7aeb82a4255955874c8242490d678f962bf0292b

    • SHA512

      870617ee16a0e67a279c7477b7b1f8fdc3912e44ea05d9b802c34e64bd6201eaa3cae1dc5d83aa39b03ccdc9b4cd5b3fbb1d4ba1cdebc89aefc971da562376f6

    • SSDEEP

      12288:6l1kPga5rr6bVHTPqH2fzXUq6y7DIvzEPMCrHxEqvIMwcjsdbXsTQiC9KmKDOlOe:67a5rGtigzEq370vzIrR1IM6us9KVDF1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks