Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_0189603e1f23a9b8726e345a4f0f463f

  • Size

    923KB

  • Sample

    250105-3jewca1mdk

  • MD5

    0189603e1f23a9b8726e345a4f0f463f

  • SHA1

    415a8a780ad010025e409e33d6a8ad259f605042

  • SHA256

    21e329ad1a25176e7e17f0215f3fb95e723942e30b0f8eb6b478023dd0a36746

  • SHA512

    f8332f923bde2b55888dd1ba2d6460b2f54d5b7699c048546505cff63bd3239339a1cfc06ae70da2bb549db572e0b5c7f2c71b8f5c7ee243ffb0d83f3f67e3e2

  • SSDEEP

    24576:kk7vQavyVoyXO+Q0drrgWID8TUo0yLWXTAxs0T:x7vQavyGZ2xrgWIUJLmYV

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

91.92.109.70:5353

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

professor

C2

91.92.109.70:9412

Attributes
  • auth_value

    e49ffb4df6cacbfbb1d4dc8e6b137a0a

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1982610890:AAFCcNp1Tl28ILhhdWKR-lR4Xpa_V1kwvCk/sendMessage?chat_id=860277004

Targets

    • Target

      JaffaCakes118_0189603e1f23a9b8726e345a4f0f463f

    • Size

      923KB

    • MD5

      0189603e1f23a9b8726e345a4f0f463f

    • SHA1

      415a8a780ad010025e409e33d6a8ad259f605042

    • SHA256

      21e329ad1a25176e7e17f0215f3fb95e723942e30b0f8eb6b478023dd0a36746

    • SHA512

      f8332f923bde2b55888dd1ba2d6460b2f54d5b7699c048546505cff63bd3239339a1cfc06ae70da2bb549db572e0b5c7f2c71b8f5c7ee243ffb0d83f3f67e3e2

    • SSDEEP

      24576:kk7vQavyVoyXO+Q0drrgWID8TUo0yLWXTAxs0T:x7vQavyGZ2xrgWIUJLmYV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • AgentTesla payload

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks