Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a6e85e9a4ced3b3473dbee2fba88ba9bf691752a10ef05b7a17af211403b8063

  • Size

    2.0MB

  • Sample

    221130-g4m7kaea26

  • MD5

    094d2ed28ba8f460f483e365585b7644

  • SHA1

    bf660d49ad1adc3ae596cf21683509dbbf89e9bc

  • SHA256

    a6e85e9a4ced3b3473dbee2fba88ba9bf691752a10ef05b7a17af211403b8063

  • SHA512

    8c35b7123e338a4cbd590ab7873146e094a98e06d1a631f6bdf2fa5e747696ea36adfe5306e5a8e388b7e6a4ce0d28632b67cdfe545bbb46c26b8dee39034255

  • SSDEEP

    49152:VkTgAdLELdDvSlMLMvvddF2kwJye6TsHWSXI1AWYnEh:VpAdLyd4MLevckGVVHWOI1/yU

Malware Config

Extracted

Family

darkcomet

Botnet

Opfer

C2

panzaknacka.hopto.org:1337

Mutex

MAC-7UVFFZ6

Attributes
  • InstallPath

    MSDCSC\sysdate.exe

  • gencode

    5KLmF0Xbpz15

  • install

    true

  • offline_keylogger

    true

  • password

    l0rn

  • persistence

    false

  • reg_key

    sysdate.exe

Targets

    • Target

      a6e85e9a4ced3b3473dbee2fba88ba9bf691752a10ef05b7a17af211403b8063

    • Size

      2.0MB

    • MD5

      094d2ed28ba8f460f483e365585b7644

    • SHA1

      bf660d49ad1adc3ae596cf21683509dbbf89e9bc

    • SHA256

      a6e85e9a4ced3b3473dbee2fba88ba9bf691752a10ef05b7a17af211403b8063

    • SHA512

      8c35b7123e338a4cbd590ab7873146e094a98e06d1a631f6bdf2fa5e747696ea36adfe5306e5a8e388b7e6a4ce0d28632b67cdfe545bbb46c26b8dee39034255

    • SSDEEP

      49152:VkTgAdLELdDvSlMLMvvddF2kwJye6TsHWSXI1AWYnEh:VpAdLyd4MLevckGVVHWOI1/yU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Modifies WinLogon for persistence

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks