Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec
-
Size
1.6MB
-
Sample
250111-btaktszjen
-
MD5
d4288cef77b05d3f8980918ed5a47dc8
-
SHA1
af8b94bfacf197b0a319878228d04e7894c65d0b
-
SHA256
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec
-
SHA512
88cde2dae3ebc4fd448b61d1e4c66fd6f74bc2df66e1880b63f9ea2cd8f05d171d4467779a0119215cb97b276f9fb501df22534619a639d729356d503b5c8e11
-
SSDEEP
49152:KWvx3m/H8Dfyp9oOTGGcjLoyEkmZ9Y14:yc7IoOrA
Static task
static1
Behavioral task
behavioral1
Sample
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zytrox.cf - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec
-
Size
1.6MB
-
MD5
d4288cef77b05d3f8980918ed5a47dc8
-
SHA1
af8b94bfacf197b0a319878228d04e7894c65d0b
-
SHA256
a99e3080a9a211bda3f0c95b712c44c496c14d0c12fff6fa83f41d564f1d84ec
-
SHA512
88cde2dae3ebc4fd448b61d1e4c66fd6f74bc2df66e1880b63f9ea2cd8f05d171d4467779a0119215cb97b276f9fb501df22534619a639d729356d503b5c8e11
-
SSDEEP
49152:KWvx3m/H8Dfyp9oOTGGcjLoyEkmZ9Y14:yc7IoOrA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-