Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a724f74717bcc081cf9ee74842f4ab7f.exe

  • Size

    134KB

  • Sample

    210927-k96smsgcaj

  • MD5

    a724f74717bcc081cf9ee74842f4ab7f

  • SHA1

    486eda597eed80d2e9e169feb98cfd7ff858fce3

  • SHA256

    5ce23fd6639f4a6e53fb0b1c680dc0bfbd45533d43d8ca8feebf443b523a3e1c

  • SHA512

    18c2d5166ed63a6d342c15c5ef00e9d6e014feb8cab2d7e7218461c84f54c4ee44086691ea0f02994a121d733850ce2468bab75a4447903dc3ca2f1231b8cda4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
1
0x33f8f0d2
rc4.i32
1
0xaa0488bb

Extracted

Family

redline

C2

92.246.89.6:38437

Extracted

Family

raccoon

Botnet

a72c96f6762e4258a13dee8bc0dd14557df18467

Attributes
  • url4cnc

    https://t.me/h_wacel1new_1

rc4.plain
1
$Z2s`ten\@bE9vzR
rc4.plain
1
0776f1b821d46ef1d070d18e3997769e

Extracted

Family

raccoon

Botnet

b2f2e53f9e27f901d453d8f6fbafe1b4d5266bb7

Attributes
  • url4cnc

    https://t.me/hcdrom1

rc4.plain
1
$Z2s`ten\@bE9vzR
rc4.plain
1
4c6ded70c93ee2e1264a0c3714b746fa

Extracted

Family

raccoon

Botnet

c524886d28411e80660e573d1de51f17556d70f6

Attributes
  • url4cnc

    https://t.me/hobabastrepsils

rc4.plain
1
$Z2s`ten\@bE9vzR
rc4.plain
1
78268750e49b0ba75aa1ef8d166ade04

Extracted

Family

redline

Botnet

Bliss

C2

185.237.98.178:62607

Extracted

Family

redline

Botnet

karma

C2

94.103.9.133:39323

Targets

    • Target

      a724f74717bcc081cf9ee74842f4ab7f.exe

    • Size

      134KB

    • MD5

      a724f74717bcc081cf9ee74842f4ab7f

    • SHA1

      486eda597eed80d2e9e169feb98cfd7ff858fce3

    • SHA256

      5ce23fd6639f4a6e53fb0b1c680dc0bfbd45533d43d8ca8feebf443b523a3e1c

    • SHA512

      18c2d5166ed63a6d342c15c5ef00e9d6e014feb8cab2d7e7218461c84f54c4ee44086691ea0f02994a121d733850ce2468bab75a4447903dc3ca2f1231b8cda4

    • Arkei

      Arkei is an infostealer written in C++.

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

      suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    • suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

      suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

    • suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

      suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Arkei Stealer Payload

    • Chinese Botnet Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner Payload

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.