Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    tmp5inh3zk1

  • Size

    733KB

  • Sample

    241002-tq323svhqp

  • MD5

    c80a6ab88197ae041f37e89de88c432c

  • SHA1

    2ff5a4f5d4c598e910a331e04dcc17a6a8c0cd82

  • SHA256

    b653369d65923416167ddd72e78411fed77a2b7be24bf6c1eba06512a232594a

  • SHA512

    7892a721f51a7d686129638ee47c4f7f15cdaaa221004cb4a52fde29111c44aac03b3a7dcc3044ae624f07870cedc00cc0e884e1801432d6bb9e6511acc0cdb9

  • SSDEEP

    12288:+L7WTG4meL6865A0phF2/lDHwu+yIlohn+9T5FfbsCsaYbRu:MSTVh6RNQIlo03NsCTIR

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bonnyriggdentalsurgery.com.au
  • Port:
    587
  • Username:
    info@bonnyriggdentalsurgery.com.au
  • Password:
    eL)rV@QBKA#m
  • Email To:
    finance@bonnyriggdentalsurgery.com.au

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bonnyriggdentalsurgery.com.au
  • Port:
    587
  • Username:
    info@bonnyriggdentalsurgery.com.au
  • Password:
    eL)rV@QBKA#m

Targets

    • Target

      tmp5inh3zk1

    • Size

      733KB

    • MD5

      c80a6ab88197ae041f37e89de88c432c

    • SHA1

      2ff5a4f5d4c598e910a331e04dcc17a6a8c0cd82

    • SHA256

      b653369d65923416167ddd72e78411fed77a2b7be24bf6c1eba06512a232594a

    • SHA512

      7892a721f51a7d686129638ee47c4f7f15cdaaa221004cb4a52fde29111c44aac03b3a7dcc3044ae624f07870cedc00cc0e884e1801432d6bb9e6511acc0cdb9

    • SSDEEP

      12288:+L7WTG4meL6865A0phF2/lDHwu+yIlohn+9T5FfbsCsaYbRu:MSTVh6RNQIlo03NsCTIR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.