Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2360548efd0e104cbc31982ecc2b3203763272c2e92109c20f9632dac7eebe2f

  • Size

    1.1MB

  • Sample

    240629-bq5xkaxele

  • MD5

    ffb088c4c220cbadd1f3f72296221be9

  • SHA1

    bf4f7b96eb46eaf37bf267828b0c60e35d2faa07

  • SHA256

    2360548efd0e104cbc31982ecc2b3203763272c2e92109c20f9632dac7eebe2f

  • SHA512

    27e50ea45f48260db56c6df40af3e6965e97d64f446c0fe39ab60bd46550e31b11dc0ad4aad5296a98d7f6622217cc387819dc835f02504f9721b8eba43adcfe

  • SSDEEP

    24576:pAHnh+eWsN3skA4RV1Hom2KXcmtcRHLRIqAUBt8Va8HGm:wh+ZkldoPKsacRrOqA7A8

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ozkahil.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    1122334455

Targets

    • Target

      2360548efd0e104cbc31982ecc2b3203763272c2e92109c20f9632dac7eebe2f

    • Size

      1.1MB

    • MD5

      ffb088c4c220cbadd1f3f72296221be9

    • SHA1

      bf4f7b96eb46eaf37bf267828b0c60e35d2faa07

    • SHA256

      2360548efd0e104cbc31982ecc2b3203763272c2e92109c20f9632dac7eebe2f

    • SHA512

      27e50ea45f48260db56c6df40af3e6965e97d64f446c0fe39ab60bd46550e31b11dc0ad4aad5296a98d7f6622217cc387819dc835f02504f9721b8eba43adcfe

    • SSDEEP

      24576:pAHnh+eWsN3skA4RV1Hom2KXcmtcRHLRIqAUBt8Va8HGm:wh+ZkldoPKsacRrOqA7A8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks