Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Neworder52825-01BB.exe

  • Size

    1.3MB

  • Sample

    250328-m4z41sxjs9

  • MD5

    39e704ee8928b91f90a7345ca1943cbe

  • SHA1

    ee19ad702a94204c35ad97f03a3a458689eed520

  • SHA256

    db9075f1eadd4b7dfbc145d16f17c50ec345e99d3b5e3b7593f86e5b8532b4c5

  • SHA512

    36b778adfe1620dc87f05e0612303991df3e7b2687f20c089a460cdaa961ef1f5deece095e904dd635ba99522e3cf764a45e9e883af1fa50db1f76582f406369

  • SSDEEP

    24576:TP7cp85auu/geyQnsGHg1CwPOf2mYqbohHozrUqBT:Lt5af8QsGjfvYys4T

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Neworder52825-01BB.exe

    • Size

      1.3MB

    • MD5

      39e704ee8928b91f90a7345ca1943cbe

    • SHA1

      ee19ad702a94204c35ad97f03a3a458689eed520

    • SHA256

      db9075f1eadd4b7dfbc145d16f17c50ec345e99d3b5e3b7593f86e5b8532b4c5

    • SHA512

      36b778adfe1620dc87f05e0612303991df3e7b2687f20c089a460cdaa961ef1f5deece095e904dd635ba99522e3cf764a45e9e883af1fa50db1f76582f406369

    • SSDEEP

      24576:TP7cp85auu/geyQnsGHg1CwPOf2mYqbohHozrUqBT:Lt5af8QsGjfvYys4T

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks