Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe
-
Size
597KB
-
Sample
240625-b742latgqh
-
MD5
01fcb8fb62b7bcf6fa81e765d0c3f571
-
SHA1
2fb9a233ba5c4ec26c275b10300b2e5b57baa435
-
SHA256
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba
-
SHA512
059f448f4db5e4ca667bc2a7fec0f45705aa9217bdb0bce701670df75cb29739cea2cdd4f1123cd6ff8d164d8552448b28def00c88ae1ff850f8cca0667230ec
-
SSDEEP
12288:1oGrkbKNHKTGwvqXsIkkTLlrvK94BPbSGgW:1oGIbIHKT7vCgk3lLu61n
Static task
static1
Behavioral task
behavioral1
Sample
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mmppf.com - Port:
587 - Username:
[email protected] - Password:
Tbk@Saudi#2030 - Email To:
[email protected]
Targets
-
-
Target
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe
-
Size
597KB
-
MD5
01fcb8fb62b7bcf6fa81e765d0c3f571
-
SHA1
2fb9a233ba5c4ec26c275b10300b2e5b57baa435
-
SHA256
c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba
-
SHA512
059f448f4db5e4ca667bc2a7fec0f45705aa9217bdb0bce701670df75cb29739cea2cdd4f1123cd6ff8d164d8552448b28def00c88ae1ff850f8cca0667230ec
-
SSDEEP
12288:1oGrkbKNHKTGwvqXsIkkTLlrvK94BPbSGgW:1oGIbIHKT7vCgk3lLu61n
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-