Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    5807cc9f9aff124d5a1817daedce175d6e1b0a133662246be9fc25ed0e8e3fad

  • Size

    2.1MB

  • Sample

    230210-jxryaabg58

  • MD5

    f05c1f94658d39527ea088d30e57f2fc

  • SHA1

    26667dc77d081aff2ea094c2ea80c0b7598fe4d5

  • SHA256

    5807cc9f9aff124d5a1817daedce175d6e1b0a133662246be9fc25ed0e8e3fad

  • SHA512

    ca55121d64d7e3dd1d9dd20836119977f0a7d3ccdaa57fa1369c814fad72aa8c5ac85de5eafdb7447cbce13fa3697a7f32da90a2e2c3860733dc9695f642f21d

  • SSDEEP

    49152:JeZE6x2UC0gzIVaxThPlMxa0LcVh/hYWPHW:MZw0+IwPiUhVh5d

Malware Config

Extracted

Family

redline

Botnet

fuka

C2

193.233.20.11:4131

Attributes
  • auth_value

    90eef520554ef188793d77ecc34217bf

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Targets

    • Target

      5807cc9f9aff124d5a1817daedce175d6e1b0a133662246be9fc25ed0e8e3fad

    • Size

      2.1MB

    • MD5

      f05c1f94658d39527ea088d30e57f2fc

    • SHA1

      26667dc77d081aff2ea094c2ea80c0b7598fe4d5

    • SHA256

      5807cc9f9aff124d5a1817daedce175d6e1b0a133662246be9fc25ed0e8e3fad

    • SHA512

      ca55121d64d7e3dd1d9dd20836119977f0a7d3ccdaa57fa1369c814fad72aa8c5ac85de5eafdb7447cbce13fa3697a7f32da90a2e2c3860733dc9695f642f21d

    • SSDEEP

      49152:JeZE6x2UC0gzIVaxThPlMxa0LcVh/hYWPHW:MZw0+IwPiUhVh5d

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks