Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    28d16c119225ca2bc8cdf6168522b3ad27b58180

  • Size

    2.6MB

  • Sample

    230203-xlltsahb87

  • MD5

    ad31c7b424625198ab1749f4db544d1f

  • SHA1

    28d16c119225ca2bc8cdf6168522b3ad27b58180

  • SHA256

    db5273410c933a199d6cde35b970ba18de85f4194870fdfa9ccdead249ecae3b

  • SHA512

    6742e3ce1dbcb2d31ecc3a2d6124da31fb8440df1c58f6a2987c78659eb420e6f35edd933bfb9c6d86b455385cc43a5ff2834e3358ff12fb46f30fac71d99eb6

  • SSDEEP

    49152:5K3RzUoNvPNxBkG/ENMiW68EjFN66j5IlTpzmpwiyC/MDW9oIEzhxaW:0PPHByivfONF5wTlFnDlD7P

Malware Config

Targets

    • Target

      Decrypter_1.exe

    • Size

      52KB

    • MD5

      6d1ba676170ee73f766248116cdb6e93

    • SHA1

      f19a13ff28e26e421d6cf1c4b8c3acf18e3cadf1

    • SHA256

      b617e08abf22ea6bf953033c43da733dfa4a786c1bceee31f04a44dd01e73294

    • SHA512

      a6104a75424eea410bfa443c784ca04f9578eb40ca93c128a66f1c72e4a88790f5cde132380aa65268d0126be0e7ea175ff89361574d863ea0c646ad4cad8ad2

    • SSDEEP

      768:wuumZxpL0il0rv/V02NoizUZ/GhlecXSpc9XWuwrm7GGul:R7jdLl0zVN/zUZ/Ghl1vzJ7Il

    Score
    4/10
    • Target

      Decrypter_3.exe

    • Size

      52KB

    • MD5

      01841cf231838463afab26ea7528943b

    • SHA1

      2f2e98b0e64f9f3fa06b4c47b5e3e1bcca01f6bc

    • SHA256

      f872d3ca926a9146ba92c2f98c839ac88da82fc27f2f975975d9a33a3d88dae5

    • SHA512

      c48d48c1ee05a6eede6de601218c0b03fbbc9e3a9eb2ee54b06db9eb6f6312fef9bf2d09270be5150a807cb302a7c2c55446fb6cb0ab7cec8a9d2fdb65df08c2

    • SSDEEP

      768:iLumZxpL0il0rv/V02NoizUZ/GhlecXSpc9XWuwrm7GGu0:u7jdLl0zVN/zUZ/Ghl1vzJ7I0

    Score
    1/10
    • Target

      decrypted_1.bin

    • Size

      596KB

    • MD5

      06380f05b2f738a9b2238e9f41df139a

    • SHA1

      440ee634c0f1ef203b453c690db10a38db1c10b6

    • SHA256

      0411c4c02b0fb6c9009804722a71950a079552e7a9eb48b3f8e437bf310c7f89

    • SHA512

      a30f4fd8ef901c3b66b7e6a2f3c192f9bee7f38156bc5fc7a41daa4b474b1f4dd7098b606f0e09e91d1263c88fd458636412d1c7697a90b4ef76aa2aaef1d52f

    • SSDEEP

      12288:HI3mn6yMpQN+YsSsQeBn9EQ/4EJzKH5rYKG5Jm9g/C:o3m6nWqQuEEvGZrtWK1

    Score
    4/10
    • Target

      decrypted_2-cleaned.bin

    • Size

      35KB

    • MD5

      c70d0658abc418288cb46aba9eb14bcb

    • SHA1

      83c4622ef69c1a24fcd5818170f8711459c3d457

    • SHA256

      97f9eba8aaaa437d361f18f5862e3683bf249800b06e7e27d3e00a67b76fce18

    • SHA512

      55fde6cb24d8d27308a701c7fe696191b13b055ac39548da24e882e2f30057a4ee9bda7ee5ec9f1c3d751eaff3e1ab3abd5526393792acb95ab36fd87e4256c2

    • SSDEEP

      768:qKkBU+GktcKrJWEGIOP6aohhDDFTN/1mtwkOdo3cmhP7BjC:qKVQjaohhtTvkOdJmJU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Target

      decrypted_2.bin

    • Size

      36KB

    • MD5

      804457c473500f8fe0d57b0864c4c87f

    • SHA1

      633c8ff70bc17c12e2727c3e1278349a8b67fe50

    • SHA256

      601ac6852746a608f82af16fe69b07a5c65afc584d59479a8fcf43bd0537997f

    • SHA512

      f68e765f26d6ff16a4f2a89f367e0cf57278a595f321a362c8b037526106dc319cd6894b4def3d1aa474ce412db0395926e7483d26abca72e196f4eac97247d9

    • SSDEEP

      768:C9S2Mfp8Y8JuL8O2qD86BhEOaDUeKR0F6Ehq5lxOBcmZPtqojC:C9S2MfgQQahEOaDUzRb5lxOWmyl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Target

      decrypted_2.zip

    • Size

      479KB

    • MD5

      73d9cfaa50432fbb0133e3abfce5f40c

    • SHA1

      6ff96f23aef03fbf7efdee970304005cfae8f088

    • SHA256

      d73e9d1fc1c5eca7d3e3c236833f6f98ec189d57aadd08bee5806170cdab6c1a

    • SHA512

      46d8901bcd853cbff340cd85a0bc980e782a174aa4c8204f7cd7a577c080442e78fb89ed49837cf7a7574ef85e31c70b4baeab292281ed3fe8e19671344eeb2a

    • SSDEEP

      6144:UTouKrWBEu3/Z2lpGDHU3ykJmnRT/EXsbIh/JW6skkf28J:UToPWBv/cpGrU3y/nNesbIZJW6nSfJ

    Score
    8/10
    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Target

      decrypter_2.exe

    • Size

      52KB

    • MD5

      db7855fd2277b2dbae476f01cf1f37f8

    • SHA1

      ca00fed8a05bb6cee985bcc0759adf4bff1440b8

    • SHA256

      b2cf520dda130d475659131de6713cf87167a48dfb5597df5e2bbd608a2c8690

    • SHA512

      fa89c016eacbd349c754b7bfca1fd885395c8eae7e8157479fee7c9e9f648b435756a5219be679da195b4d6ae0c3b83de80569137fc6f3a533e49b7755346647

    • SSDEEP

      768:k5XumZxpL0il0rv/V02NoizUZ/GhlecXSpc9XWuwrm7GGu9:aX7jdLl0zVN/zUZ/Ghl1vzJ7I9

    Score
    1/10

MITRE ATT&CK Enterprise v6

Tasks