Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    tmp

  • Size

    400KB

  • Sample

    240304-qwd4csbd9x

  • MD5

    d8ed33d452d8d7aea788c38df812c76f

  • SHA1

    6cb868e92badd1aed8b6fe2d6b56e76f04295383

  • SHA256

    bc166cd7e28545d2f52b1cce3f2eafc4824b4b4252440859cc4b7286e95bd8b5

  • SHA512

    6cbde610d30a0200b473f78542c9cb497702cc4b3240a9744b4bf53412a02049957495e785d53ad59faadeb128f3e4c939824569d00db69339463a8770f5f7b4

  • SSDEEP

    12288:B6niGh0/aP5R9XERpLR10qrRvnSWsNFGmOE7NF:B6R0/aXi1DV7s2m17b

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      tmp

    • Size

      400KB

    • MD5

      d8ed33d452d8d7aea788c38df812c76f

    • SHA1

      6cb868e92badd1aed8b6fe2d6b56e76f04295383

    • SHA256

      bc166cd7e28545d2f52b1cce3f2eafc4824b4b4252440859cc4b7286e95bd8b5

    • SHA512

      6cbde610d30a0200b473f78542c9cb497702cc4b3240a9744b4bf53412a02049957495e785d53ad59faadeb128f3e4c939824569d00db69339463a8770f5f7b4

    • SSDEEP

      12288:B6niGh0/aP5R9XERpLR10qrRvnSWsNFGmOE7NF:B6R0/aXi1DV7s2m17b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks