Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    18419205b776ad7de03bfb3abf64d5ac97e50e79e87b7591bcff3e667042d0b9

  • Size

    1.5MB

  • Sample

    250207-brcbmsvpej

  • MD5

    6b9ae2fafd6891191b89fdb1365b6645

  • SHA1

    8d1399219d9460865b05278d7b875a9b7ba39f49

  • SHA256

    18419205b776ad7de03bfb3abf64d5ac97e50e79e87b7591bcff3e667042d0b9

  • SHA512

    42a828df28a640cfa9578c1495f74a19a7bc5e49f438d176d118dca454eb17c2a490587e97461bbf1b513a3cf551c81945859bf037af289fdc29553fb9a8f8f1

  • SSDEEP

    24576:p+ecOmA9dBztpKzLDd58ZYqIPCR8LDUNgDb5eWS7abN7GXPpXjbVxiZcg3vZTINh:p+SHdtKbT8vIaUDUNsb59wm0Z9xqcS14

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5310184325:AAFI3fSQ6VcGu_NSTmv7d-qK2WCVhYY_qfg/sendMessage?chat_id=1293496579

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5422204482:AAEu-I3AZCMcCehYPkAHAbI6qEwhd1OKxpk/

Targets

    • Target

      Dekont.pdf.exe

    • Size

      1.6MB

    • MD5

      89ca21034328458a20418d85211e2a32

    • SHA1

      7eff6c36a2104231dab0c665b4cfe23479df6c92

    • SHA256

      b5ca8fbe69f6cc1ce98e1a5b51daadb7749786efae91a320e2148cd0da30f42f

    • SHA512

      afde5b1e081c10fc00cbec24e4b94ee3b616f637b50f1d1480fef9ac97bec1ed3356a971d3c8f32f479b3cef2912b6aa5b85be1d6c92e20b7542ccd7ebb71aa3

    • SSDEEP

      49152:+pCG8Aq/oZ4FDMopTWfqEUU2Zklsi9LPTF:+phnqMopafSulswLB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Blustealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks