Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    PO_1718148891.exe

  • Size

    315KB

  • Sample

    240612-p2cbaaygkl

  • MD5

    443ca3b97b4a9feb8013e292aecbf3d2

  • SHA1

    da7e97c7630bed21ea26436c879a9442031efe67

  • SHA256

    f6980a9e6283890897bc72182126cfc31622b285a7793f648e3a7d3cb350bf10

  • SHA512

    c1f5157c08bbcd80a32a670da65b21d5d9bc2b4ab0e828e08ff088e2156061df31f0d6015fecb5afb94548d8251243f8f8d82f6414d697358d76154b34cb2920

  • SSDEEP

    6144:FhABF8y5ogBmhlEsU/5ccfuqMbULEriVI9hhrfAiedJ:7ABqyVEhw/5cnALEriVqhJA

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO_1718148891.exe

    • Size

      315KB

    • MD5

      443ca3b97b4a9feb8013e292aecbf3d2

    • SHA1

      da7e97c7630bed21ea26436c879a9442031efe67

    • SHA256

      f6980a9e6283890897bc72182126cfc31622b285a7793f648e3a7d3cb350bf10

    • SHA512

      c1f5157c08bbcd80a32a670da65b21d5d9bc2b4ab0e828e08ff088e2156061df31f0d6015fecb5afb94548d8251243f8f8d82f6414d697358d76154b34cb2920

    • SSDEEP

      6144:FhABF8y5ogBmhlEsU/5ccfuqMbULEriVI9hhrfAiedJ:7ABqyVEhw/5cnALEriVqhJA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks