Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7

  • Size

    2.4MB

  • Sample

    221101-ly65psbean

  • MD5

    2e741b20a9b1a20eb723e30d8f0ce395

  • SHA1

    7bf2f2a5c210ab1d4b1b70b8541550193924722b

  • SHA256

    72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7

  • SHA512

    f946462ef91f5c2f0486d195e51ea3f7694a68797ee0f1910e2e518de1221023ef003772d9d1f3adf0c7d321435085dde6a3b262c65c953060282167a73dc5b9

  • SSDEEP

    24576:nZAsE+YcYdlNbgwM1/lc+7+F+NalOxkey5mILPKTLfSzvHmh/NeCql3RuQ55313S:esgT+85mILPKTkDl3o

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    3635ab4d86c01914c9036a302ef7c402

Targets

    • Target

      72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7

    • Size

      2.4MB

    • MD5

      2e741b20a9b1a20eb723e30d8f0ce395

    • SHA1

      7bf2f2a5c210ab1d4b1b70b8541550193924722b

    • SHA256

      72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7

    • SHA512

      f946462ef91f5c2f0486d195e51ea3f7694a68797ee0f1910e2e518de1221023ef003772d9d1f3adf0c7d321435085dde6a3b262c65c953060282167a73dc5b9

    • SSDEEP

      24576:nZAsE+YcYdlNbgwM1/lc+7+F+NalOxkey5mILPKTLfSzvHmh/NeCql3RuQ55313S:esgT+85mILPKTkDl3o

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks