Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102
-
Size
1.0MB
-
Sample
240711-bn5tsa1aqq
-
MD5
9d10b8a649fd115c297d41f1f7a4b226
-
SHA1
3462a4ce08abe9a965903a8fbf0b7135328a008d
-
SHA256
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102
-
SHA512
922bcde7c496aa7a88b590744daa34859818be904b46ddcba66e07565649416eac025ecf463d03fccc59bc4ca727e936df5d4aeb9c0da0f51a893c4ea73f99c6
-
SSDEEP
24576:MAHnh+eWsN3skA4RV1Hom2KXMmHaGLlg6C8vC7mVGcaA5:rh+ZkldoPK8YaGLlvCCL1
Static task
static1
Behavioral task
behavioral1
Sample
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
terminal4.veeblehosting.com - Port:
587 - Username:
[email protected] - Password:
^%wY3bvY{FmA - Email To:
[email protected]
Targets
-
-
Target
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102
-
Size
1.0MB
-
MD5
9d10b8a649fd115c297d41f1f7a4b226
-
SHA1
3462a4ce08abe9a965903a8fbf0b7135328a008d
-
SHA256
fc4c4a671af565561ec3049912d3d278cb2f64f2c96332b4ea18a24abc3f4102
-
SHA512
922bcde7c496aa7a88b590744daa34859818be904b46ddcba66e07565649416eac025ecf463d03fccc59bc4ca727e936df5d4aeb9c0da0f51a893c4ea73f99c6
-
SSDEEP
24576:MAHnh+eWsN3skA4RV1Hom2KXMmHaGLlg6C8vC7mVGcaA5:rh+ZkldoPK8YaGLlvCCL1
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-