Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Eurovisioner.exe
-
Size
548KB
-
Sample
240503-nat7cafb33
-
MD5
e90feee8c6994f0cd73a792ea886693c
-
SHA1
e0c070b38f16693aacc47a0c11e5a0036191b1db
-
SHA256
a31748dd0aa6f53cbfa189bef070a2304e385ef18c0bab5672e039c4a12c41f7
-
SHA512
07158b7462c3ca51f0ce5737cab77ea93144105f40117341a6e79624c5ac7492365a85ce724724de9ff845367ebf1b44e061a19410b860699ce349676b0ba707
-
SSDEEP
6144:h1onKQNqlcuBZB478o/iDx5ux04TcMR5C33BlqS0gGD3WNfX5Slhv2:TozEBTyH/wzuO4TvC33vWgGDGxSl92
Static task
static1
Behavioral task
behavioral1
Sample
Eurovisioner.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Eurovisioner.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.escolaprofissionaltomar.com - Port:
587 - Username:
[email protected] - Password:
*Acnbc232430# - Email To:
[email protected]
Targets
-
-
Target
Eurovisioner.exe
-
Size
548KB
-
MD5
e90feee8c6994f0cd73a792ea886693c
-
SHA1
e0c070b38f16693aacc47a0c11e5a0036191b1db
-
SHA256
a31748dd0aa6f53cbfa189bef070a2304e385ef18c0bab5672e039c4a12c41f7
-
SHA512
07158b7462c3ca51f0ce5737cab77ea93144105f40117341a6e79624c5ac7492365a85ce724724de9ff845367ebf1b44e061a19410b860699ce349676b0ba707
-
SSDEEP
6144:h1onKQNqlcuBZB478o/iDx5ux04TcMR5C33BlqS0gGD3WNfX5Slhv2:TozEBTyH/wzuO4TvC33vWgGDGxSl92
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3f176d1ee13b0d7d6bd92e1c7a0b9bae
-
SHA1
fe582246792774c2c9dd15639ffa0aca90d6fd0b
-
SHA256
fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
-
SHA512
0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
SSDEEP
192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
Score3/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
b5a1f9dc73e2944a388a61411bdd8c70
-
SHA1
dc9b20df3f3810c2e81a0c54dea385704ba8bef7
-
SHA256
288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
-
SHA512
b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8
-
SSDEEP
96:p7GUxNkO6GR0t9GKKr1Zd8NHYVVHp4dEeY3kRnHdMqqyVgNQ3e:lXhHR0aTQN4gRHdMqJVgNH
Score3/10 -