Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
C++ Dropper.exe
-
Size
18KB
-
Sample
210412-pt6xbzpxfj
-
MD5
356dc1680475998c7c23e199f2c2e9ca
-
SHA1
8eadece945d635093c04a9d871ea0ead59d8e89f
-
SHA256
e5990480cda6207bf008957ae5a3fa3debe6303fd19c3babc3f2223bf769479c
-
SHA512
ea11d80221f730b0517f80350b474eb790109add96aff70af618dec1d8ee270a5ab8d42f2cf12becf02dfdcbbdeb48c4d339151f055945b802e9f0d88179b7dc
Static task
static1
Behavioral task
behavioral1
Sample
C++ Dropper.exe
Resource
win7v20201028
Malware Config
Extracted
raccoon
f55f17175de492dccaffeb57cb41e8ca951c34c4
-
url4cnc
https://tttttt.me/umiumitfr3
Targets
-
-
Target
C++ Dropper.exe
-
Size
18KB
-
MD5
356dc1680475998c7c23e199f2c2e9ca
-
SHA1
8eadece945d635093c04a9d871ea0ead59d8e89f
-
SHA256
e5990480cda6207bf008957ae5a3fa3debe6303fd19c3babc3f2223bf769479c
-
SHA512
ea11d80221f730b0517f80350b474eb790109add96aff70af618dec1d8ee270a5ab8d42f2cf12becf02dfdcbbdeb48c4d339151f055945b802e9f0d88179b7dc
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-