Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    d8770e0a7f9ee1a53bd4362532ecef3f.bin

  • Size

    650KB

  • Sample

    240504-cbebqsad2w

  • MD5

    4073f95482c444a29342623b2ca30259

  • SHA1

    7878b6f8846d5f5679aa15a38039433ef2d69829

  • SHA256

    a1dae719dea7b38c0db9914dc1b61f96698a7eea8207eeb332dfb820c97be555

  • SHA512

    3809ec30b0883c290b661c996bcb656e6df851931df995a4329463b36dfa539e0fb76e94d7a9d86da526fa3cc945d6532a2fc7247959f8013208c286ddc0a3bc

  • SSDEEP

    12288:EaSe1X6q5Pnj+q2KXMCXBY1JX1GiBlWal95triypihO7SRSy:H1qKPnSibaWiBlr/3riypn+RSy

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.metalsbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zxcA@@258963

Targets

    • Target

      3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f.exe

    • Size

      699KB

    • MD5

      d8770e0a7f9ee1a53bd4362532ecef3f

    • SHA1

      50745b96bc64c065e8f66bc07589961c15f6ed21

    • SHA256

      3c29b509fac248a90cdb5970352752041fe1c02034f06b81182c5bb8b311766f

    • SHA512

      e5c9a9b14eae8a3b1ab21634388676269ee1da130c8600bcfa78a31f3d48f7706db12cc499f47840843c63af4f6fa720196b96199738bd5af648abb40f1ed0b7

    • SSDEEP

      12288:o3/T3/fVrTtK3/3gCgkhkNRIFzhx+xxyZAcI+KQoKJ/vY2Kcsxgdyi7V8Ane3/zt:orXVrTtK7tR+zyZNTKQoo/vY2exAyi7O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks