Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_6285ae9a1953232716b7817c6bce1ba6

  • Size

    496KB

  • Sample

    250102-ekjnxsskcx

  • MD5

    6285ae9a1953232716b7817c6bce1ba6

  • SHA1

    8ea818cd4c61b6c53a5eea7f5ff19cdd9e60a8fb

  • SHA256

    39b52356da1f35c5bad343eea8880f4d8bdd6c0228a7a9b85e5f0117c6296287

  • SHA512

    2dbdebc96f92dfda7a146f3ade91af8b4ac66ab9dd9d51b5efb72a0b5cd789086b49cdb435e837a013d7a29e9a4a9c148ad5ece84e2129fad84c5944b9485581

  • SSDEEP

    12288:fPVEdXo7/apwbQB6R751Hlie+XhTalWP6lTcNeH1ug2nMnMqDXWxbnN:3VKu/jbp3lihmUiKwHs

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1944842353:AAF4AUZAlM1Eseaom3hr9cg9ol6hzIat_qw/sendDocument

Targets

    • Target

      JaffaCakes118_6285ae9a1953232716b7817c6bce1ba6

    • Size

      496KB

    • MD5

      6285ae9a1953232716b7817c6bce1ba6

    • SHA1

      8ea818cd4c61b6c53a5eea7f5ff19cdd9e60a8fb

    • SHA256

      39b52356da1f35c5bad343eea8880f4d8bdd6c0228a7a9b85e5f0117c6296287

    • SHA512

      2dbdebc96f92dfda7a146f3ade91af8b4ac66ab9dd9d51b5efb72a0b5cd789086b49cdb435e837a013d7a29e9a4a9c148ad5ece84e2129fad84c5944b9485581

    • SSDEEP

      12288:fPVEdXo7/apwbQB6R751Hlie+XhTalWP6lTcNeH1ug2nMnMqDXWxbnN:3VKu/jbp3lihmUiKwHs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.