Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    5d8dd83857fc3cc6d5019853710bfcfb.bin

  • Size

    625KB

  • Sample

    240118-bzassaaccq

  • MD5

    07cf960134921a71bf86d24e41173b44

  • SHA1

    56973a30fb7ce5f363b3ee25084ba518fd41446b

  • SHA256

    74c7236dea30033f41ad600a07ff1c6976d41d941130eca84fc0f4d67cb1a093

  • SHA512

    71a7f4ad9b49948be6d9f50017b26eccff7be76d9d8140ad172a424aef771f5ca28492b83a90eaef404085e7729c4ab4da19c335f914a65e58f705187b3d2829

  • SSDEEP

    12288:aIKsDY5hvBe4NDl4vXPMIi/LefG3crD6VG7WlErXHvb0j+eWuL:ah24NDyXPM3AGE6iXHvb0aeb

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pharmacell.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fatih-2015a

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      HesapEkstresi_08012024_13014688_3871782_MY_2.exe

    • Size

      669KB

    • MD5

      cb17689f9f2f8ead0450a9fa21ea6920

    • SHA1

      44f2a04f059e94ce47a2da8ed0b175a97e20ddde

    • SHA256

      390742120fc89ba2735772dbb63c0998bdb2d26df99976a5406477c4ffab56c2

    • SHA512

      43d729df8acf4eb2fe56c7432835340214b571a942e12566eef1eab656b7c1e263d3ac6b76087757034294382c90f1f53d3c9b8c83e80783fc868e94e916c76b

    • SSDEEP

      12288:Pz1uPBa5rr1wAM1F0XtZFBlZMMDcrKJSja7kaGPASF:Pua5rvM1FqnFBnMMDTSyoASF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks