Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.14262.exe

  • Size

    7.5MB

  • Sample

    220921-117lkshbb4

  • MD5

    3ce5473ec9e1e9dea07277cf8cb41ac5

  • SHA1

    f7c8abc2e8cee7c6bd9fb9302e8e9da3b0276c66

  • SHA256

    a652d114cf9604fc80c93c16e12323d2377793dc4a8b71a136c35f77c600c840

  • SHA512

    48f20c5c23484e5e3eff9c34dc4730ec838661b2e77db2c154c472edf795cb6900b72472a6ed200e9197433a72921a219ceaa776f4a89337a2ab066365c3a7b2

  • SSDEEP

    196608:0636P6Fa1wwRtGhgm6Nk90In4oso6Lg6xaxQa0J5MhlewJ:C3qsl

Malware Config

Extracted

Family

redline

Botnet

sep16as3

C2

185.215.113.122:15386

Attributes
  • auth_value

    40bb2fe8692bc4f8451694273411f3ae

Extracted

Family

redline

Botnet

Lyla3.18.9

C2

185.215.113.216:21921

Attributes
  • auth_value

    af42ec3c2992d951ef41b056b1137d3b

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.14262.exe

    • Size

      7.5MB

    • MD5

      3ce5473ec9e1e9dea07277cf8cb41ac5

    • SHA1

      f7c8abc2e8cee7c6bd9fb9302e8e9da3b0276c66

    • SHA256

      a652d114cf9604fc80c93c16e12323d2377793dc4a8b71a136c35f77c600c840

    • SHA512

      48f20c5c23484e5e3eff9c34dc4730ec838661b2e77db2c154c472edf795cb6900b72472a6ed200e9197433a72921a219ceaa776f4a89337a2ab066365c3a7b2

    • SSDEEP

      196608:0636P6Fa1wwRtGhgm6Nk90In4oso6Lg6xaxQa0J5MhlewJ:C3qsl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detectes Phoenix Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks