Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa

  • Size

    195KB

  • Sample

    221224-acf6lshd23

  • MD5

    7e6ca7774e182ed331340f614af9d770

  • SHA1

    0d3a1cf5b7f7f00a81c7056b5e489d8a8375b3ed

  • SHA256

    41918b4a3dacbcbbc2151efa5208315fd0aaecf08575b19bb74ab16f60df6fb1

  • SHA512

    d2a82bb0a4308f7e3b5a72ae8df47dff6cba47334a6eab9ec2f1f400ce400637136b763801ab8ece301f2765dddb08e1a6f45db894b5b4f0a802148a8bd68bba

  • SSDEEP

    6144:WT3D9kVzMJFXbYGq+x5whJ4XvR158YXeIeDaTGAepDwglJT5:WrD9uSFXEGqYwhaX5XXrGAa1F5

Malware Config

Extracted

Family

amadey

Version

3.61

C2

62.204.41.79/U7vfDb3kg/index.php

Extracted

Family

amadey

Version

3.63

C2

62.204.41.182/g9TTnd3bS/index.php

Extracted

Family

amadey

Version

3.60

C2

193.42.33.28/game0ver/index.php

Extracted

Family

redline

Botnet

Post

C2

138.124.180.186:39614

Attributes
  • auth_value

    4bda2ce09764851c19dedd9d8ed8328e

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/wduwe19/

Targets

    • Target

      fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa

    • Size

      281KB

    • MD5

      af991d7c2db58e42549976ccb36e5cc7

    • SHA1

      748c8a3a47d7331df0fc2f25a4e891161ec11c2d

    • SHA256

      fd016b0f0a876b5fc97df610464984865015fe799b2ff700e672168737e44faa

    • SHA512

      d57b56ea10ba0abf572ec67a272e0e6b958a4ddd27d9f8d92cfb31191cf9838132b99936f15490ca67acdedaddaae2c4a9239e30adef4d9cd970e0bff7421b2a

    • SSDEEP

      6144:hYPLCzXNHJFXbYGq2x5whJ4X5R158YXeIeYC8o13azHk5o:hg2zXHFXEGqAwhaXXXXeZaQ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detect rhadamanthys stealer shellcode

    • Detects Smokeloader packer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks