Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f
-
Size
936KB
-
Sample
221012-t24srabfeq
-
MD5
4e88286476d26cead4caafb1231ec062
-
SHA1
e7051669e96f7c80b8affc1554d0fa6e9fad5117
-
SHA256
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f
-
SHA512
06de3ec1d5d4f018b8ce9af031c2c37f89e09bd6c49b3a33f774a7bcb00ef3160906b4a8fcc3a93d1b5324bb05c2c4e57ebe6776524125c57585f790452b9e23
-
SSDEEP
24576:J6K2h1iVrItFQWGKN+NXN40JIyLrFHDvk:J6K286n+NXmWb1j
Static task
static1
Behavioral task
behavioral1
Sample
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
formbook
g2vp
vz0+DrD922K7
V5ZNAytMxUPisN5i
Vybph6lLcYZKp1DCPg==
9G7+3oNwb8g=
rLSpOybMkJg7zg==
Waxl6QhHkJg7zg==
+VcesNB/gWPH7f6OTx5TCsmQIQ==
qY1JBTFp78tVa0NoY1fRgA==
mJBPbgYFyiyi
Kn4x3wYykJg7zg==
HV4LyfYgnoBkBmjQjDE/6Jc=
5fztl7/4km4ft/A49wgjlw==
WhORUSjYSG8/0w==
q2odpxEmGy8jOSM=
mpiaKMwZKWwQKhpFAme9mu7WNg==
SlBF07lCZ3AiZF2iIZUnCQnqtvnqXBA=
qigcpxO2PpxU7ClaJovhvToKClAYexg=
4nBYD4adzkTisN5i
WKleKtX1IotJ3QxT2vUkq4o=
yE5P+SVt40XisN5i
Iz066oeWg82r99cq9NsZ6tS6OA==
OngfwDp2sTql9ZfvYJE=
BFALkXmGG/pigFucctgntpYe/Xw=
Rxjai4CYSTujp1DCPg==
9LMlxWT1fyRKu+5jKIW9RrpRT6Ak
mq6lQzrd5sYuVmdUJoY=
txC/XAYMXapg/j5r5DVH7Z0=
it6MI4odq3UuQGnpwtUYJ41q
qRQY3wlCkJg7zg==
RefQaNb+DngFVMdO7Q9PGoRo
zVBC54k4xlh61DOcj1LS
4yjrgaJPhZBJp1DCPg==
D8iSOd15H7JieONo
u3MnxW243WhOnrwZLkTR
kaGXNCa5y8w9h91O4zI8tduITlxR/hYHrw==
G+qfLbw0kJg7zg==
xurdiICpGi6I2TajNg==
IU+glMwLvtv3OiY=
ABIY3wqfwvMdZj4=
+1Qi3YQqpwCnsiarboDY+3Bg
GlodyvKi3kDp9SiVSL/HQ2I0G7OMr3Aspw==
zZpYEz7b1q1h6TymPbY46q+VHV4dyij6
okAx1Iba3j4mdJ+gHyNh7JU=
lhwZy20WpvMdZj4=
xyffbd4OLEGjqepk81FeCsmQIQ==
m2Ea2tFsmKwPHwJGHLG3TPTYXHQ=
h1EFqdaNuhwDUGdUJoY=
BvX8kgKUKvfisN5i
ewQa3gIKm33tQojlmDVH7Z0=
NIQgu12aZsMgOhQZLkTR
A8SBD36rtQStv6zimjVH7Z0=
9W5h+WoHh+hBRxtS9wgjlw==
0NDNX0NIWsI=
iy8Vx3XKz/MdZj4=
32l1JFB/LjwwzP5b8URXCsmQIQ==
pTlF7wogxs+7Y8w/9wgjlw==
+rx2Uuj922K7
s4s08x5cyaqTzgWMNiGvesdRT6Ak
4dvTk8gStaxehF+VEmHjCsmQIQ==
2OHNXkNIWsI=
gE79p0hjV6l/2X7sq07X
r3Ed7xe44kIr0zOH68sYJ41q
goj89VmMlb8fSSgZLkTR
xRjJg6q9TyqU4jnKqvstuJYe/Xw=
americnamusical.com
Targets
-
-
Target
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f
-
Size
936KB
-
MD5
4e88286476d26cead4caafb1231ec062
-
SHA1
e7051669e96f7c80b8affc1554d0fa6e9fad5117
-
SHA256
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f
-
SHA512
06de3ec1d5d4f018b8ce9af031c2c37f89e09bd6c49b3a33f774a7bcb00ef3160906b4a8fcc3a93d1b5324bb05c2c4e57ebe6776524125c57585f790452b9e23
-
SSDEEP
24576:J6K2h1iVrItFQWGKN+NXN40JIyLrFHDvk:J6K286n+NXmWb1j
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-