Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2611af3b26d3d80a064dcde4cdf13e29b6c930cf0bd1ba8ddc7a629d5d4afcb4

  • Size

    459KB

  • Sample

    230311-tj2knsad63

  • MD5

    3f5876805a310cd67901f1440f8ac23a

  • SHA1

    eac60cf0d35a760f1b0878ede2e9d871667a25b0

  • SHA256

    2611af3b26d3d80a064dcde4cdf13e29b6c930cf0bd1ba8ddc7a629d5d4afcb4

  • SHA512

    8eb1246525a705f9ed24dd70611ebbda64425234d1d1f6643473557755825aba2658ce646d299af5238bfbee3fc47f811f90a5a42e4c151af4b1449bdede39b2

  • SSDEEP

    12288:g9oD+S8zhn8Z+RGOR9UJWzflQ9PWPIsDq:g9Fd2+Ma9UkJQtWPrDq

Malware Config

Extracted

Family

redline

Botnet

well

C2

193.233.20.28:4125

Attributes
  • auth_value

    265e7373dd436339d88347c08a10b402

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      2611af3b26d3d80a064dcde4cdf13e29b6c930cf0bd1ba8ddc7a629d5d4afcb4

    • Size

      459KB

    • MD5

      3f5876805a310cd67901f1440f8ac23a

    • SHA1

      eac60cf0d35a760f1b0878ede2e9d871667a25b0

    • SHA256

      2611af3b26d3d80a064dcde4cdf13e29b6c930cf0bd1ba8ddc7a629d5d4afcb4

    • SHA512

      8eb1246525a705f9ed24dd70611ebbda64425234d1d1f6643473557755825aba2658ce646d299af5238bfbee3fc47f811f90a5a42e4c151af4b1449bdede39b2

    • SSDEEP

      12288:g9oD+S8zhn8Z+RGOR9UJWzflQ9PWPIsDq:g9Fd2+Ma9UkJQtWPrDq

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks