Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    df6a093ec1614012dcf2a8ffba854772008f204cab3e5f9acf163424b1f61609

  • Size

    658KB

  • Sample

    230308-ytkr5agg63

  • MD5

    56b7c9e2f031d82b9afe9195b1dc574d

  • SHA1

    a1500041e56d5a0f5e55ea6fdbf5e43f7b561c9c

  • SHA256

    df6a093ec1614012dcf2a8ffba854772008f204cab3e5f9acf163424b1f61609

  • SHA512

    c7d73f77a92f8557dec040792e5beb2a4fe88369c0c0ac84363a52f918132e58b9dd8bfacd6556ba6ea3fd71198662f2c7ca9c371340716a1043ec30ec3b7df9

  • SSDEEP

    12288:DGUNOvRdW2wowFFXOANnXLotGw0RyQYpxJKp+WuqRkR5fMpSQS:DqRrwx/XXnuXxNpxJKIW5cVihS

Malware Config

Extracted

Family

redline

Botnet

garry

C2

193.56.146.11:4173

Attributes
  • auth_value

    210ba56bf751fefe327f26e00f0be5a9

Extracted

Family

amadey

Version

3.68

C2

193.56.146.218/images/IMG_489440/index.php

Targets

    • Target

      df6a093ec1614012dcf2a8ffba854772008f204cab3e5f9acf163424b1f61609

    • Size

      658KB

    • MD5

      56b7c9e2f031d82b9afe9195b1dc574d

    • SHA1

      a1500041e56d5a0f5e55ea6fdbf5e43f7b561c9c

    • SHA256

      df6a093ec1614012dcf2a8ffba854772008f204cab3e5f9acf163424b1f61609

    • SHA512

      c7d73f77a92f8557dec040792e5beb2a4fe88369c0c0ac84363a52f918132e58b9dd8bfacd6556ba6ea3fd71198662f2c7ca9c371340716a1043ec30ec3b7df9

    • SSDEEP

      12288:DGUNOvRdW2wowFFXOANnXLotGw0RyQYpxJKp+WuqRkR5fMpSQS:DqRrwx/XXnuXxNpxJKIW5cVihS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks