Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8878f15cafbcb057a086d9e13afc279622885d29c9f51daa8ca67336ebaa455b.exe

  • Size

    1.1MB

  • Sample

    240614-bzassazenf

  • MD5

    e1f5e820f3cc517274cfb73f4e09f1e2

  • SHA1

    f3c7954e415e73fcdef51171aa55155a9e4fa426

  • SHA256

    8878f15cafbcb057a086d9e13afc279622885d29c9f51daa8ca67336ebaa455b

  • SHA512

    3dfcbaf9ed039babfc68b6746ee9c65a88213820cb203affa0183340e2013fc83a4bdf20126df88019c3d677492f3977f9352e01ca4dad100cbb1ae364688223

  • SSDEEP

    24576:+AHnh+eWsN3skA4RV1Hom2KXMmHa57GZp0R2NW/5:ph+ZkldoPK8Ya57GZQ2k

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8878f15cafbcb057a086d9e13afc279622885d29c9f51daa8ca67336ebaa455b.exe

    • Size

      1.1MB

    • MD5

      e1f5e820f3cc517274cfb73f4e09f1e2

    • SHA1

      f3c7954e415e73fcdef51171aa55155a9e4fa426

    • SHA256

      8878f15cafbcb057a086d9e13afc279622885d29c9f51daa8ca67336ebaa455b

    • SHA512

      3dfcbaf9ed039babfc68b6746ee9c65a88213820cb203affa0183340e2013fc83a4bdf20126df88019c3d677492f3977f9352e01ca4dad100cbb1ae364688223

    • SSDEEP

      24576:+AHnh+eWsN3skA4RV1Hom2KXMmHa57GZp0R2NW/5:ph+ZkldoPK8Ya57GZQ2k

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks