Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
3560792f6c31f4a356405ab3823e73db.bin
-
Size
36KB
-
Sample
230313-lmz71shf76
-
MD5
dce9a05a8520e6e1824be6c8d5323bd8
-
SHA1
2e80d17a924db3ac688d1aa5773ff3120eb10e66
-
SHA256
23eb5ce08da7b25da36273341a12ea84f5a062fc77fe32cedb83d6310f572b12
-
SHA512
d568af33970c6ae09ca4189e6ca6309a587473bf530c5019e37da6947ea95d89f3ae195f27438902ab4b9cf854281d34774c3f15597a9150045c1072080fb9f6
-
SSDEEP
768:5xpd5u4wEWfM4Xj/V6eGjsXCOfPhIFUwDHb69j/1fY09TO6:5xpvu4LmM4bseWEJI2w4GGT
Behavioral task
behavioral1
Sample
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0x77BC9dDbaf423139eC0C7F699B676c72Ab34fcc7
TCX5ybBsuZE2BZk6GJMqZaCjBEjiuX1zPP
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
Targets
-
-
Target
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
-
Size
77KB
-
MD5
3560792f6c31f4a356405ab3823e73db
-
SHA1
e18e31539269df2c0fc338858a752084a94d53f2
-
SHA256
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
-
SHA512
36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
SSDEEP
1536:gd3Mz8GTuBVLcC9Vv2oK+52KdqlfFdIueeeeeeeeWeeeee:9wGcVLHDv/xTqlfF
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-