Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    923fc964a80c47d57aeafc0ddbff753ac3ba854655b0231b358e54f54512503b.exe

  • Size

    681KB

  • Sample

    240213-dv5tgafd3v

  • MD5

    65eb5063ffd21ea06563acdde5b0aec5

  • SHA1

    9109276193763e3a58b4d8fe472c5d4730b37b33

  • SHA256

    923fc964a80c47d57aeafc0ddbff753ac3ba854655b0231b358e54f54512503b

  • SHA512

    a53c5750a427297426cc23416e9dc282814a1210cfc30ec7bf818770315d819cfd32b432d1b411f05a5394afa8df323ec028e136a38ae70a44edf28d53d64cb1

  • SSDEEP

    12288:nJEzqHKMbNeCpN/PmNcfF+RZnGItAdjfRnisFIH9XonxvK4+n0cV:nSz87bv/u/lO169evKb0

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      923fc964a80c47d57aeafc0ddbff753ac3ba854655b0231b358e54f54512503b.exe

    • Size

      681KB

    • MD5

      65eb5063ffd21ea06563acdde5b0aec5

    • SHA1

      9109276193763e3a58b4d8fe472c5d4730b37b33

    • SHA256

      923fc964a80c47d57aeafc0ddbff753ac3ba854655b0231b358e54f54512503b

    • SHA512

      a53c5750a427297426cc23416e9dc282814a1210cfc30ec7bf818770315d819cfd32b432d1b411f05a5394afa8df323ec028e136a38ae70a44edf28d53d64cb1

    • SSDEEP

      12288:nJEzqHKMbNeCpN/PmNcfF+RZnGItAdjfRnisFIH9XonxvK4+n0cV:nSz87bv/u/lO169evKb0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks