Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    file.exe

  • Size

    725KB

  • Sample

    230214-f11g2sad5s

  • MD5

    56894bf48f6ed67995399ef935562119

  • SHA1

    3453194718b56a921dd6dfce480812ecefdd58c3

  • SHA256

    c83da10a67297a4d8a4a4e4df16fe1b7aad25270c1f9cb7165a8579c8a8ae0c5

  • SHA512

    1755abf864c2c9e9176db7fe01552808b89df337baac5eb13e6e671f36b0637a51a6166a2676cf25317175db5bc872b2707d46bc34d5cd8c9e4ce34f00017274

  • SSDEEP

    12288:rMrpy90hQD8ReVKQpQyiWBS2snFe4OxJqTi9og13A9lT5dqP+luWtt/D:KyQcVfpQyzIl/Ofqtd9lldbXRD

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

amadey

Version

3.66

C2

193.233.20.2/Bn89hku/index.php

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      file.exe

    • Size

      725KB

    • MD5

      56894bf48f6ed67995399ef935562119

    • SHA1

      3453194718b56a921dd6dfce480812ecefdd58c3

    • SHA256

      c83da10a67297a4d8a4a4e4df16fe1b7aad25270c1f9cb7165a8579c8a8ae0c5

    • SHA512

      1755abf864c2c9e9176db7fe01552808b89df337baac5eb13e6e671f36b0637a51a6166a2676cf25317175db5bc872b2707d46bc34d5cd8c9e4ce34f00017274

    • SSDEEP

      12288:rMrpy90hQD8ReVKQpQyiWBS2snFe4OxJqTi9og13A9lT5dqP+luWtt/D:KyQcVfpQyzIl/Ofqtd9lldbXRD

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.