Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    d5c7300ccac66d9c7a0b20773cb7ed35bcfeccd1852a97bb648fedfd307fafb0

  • Size

    656KB

  • Sample

    230316-2l5zwadb84

  • MD5

    f589489ffabe3e40459e491b1e41c7b9

  • SHA1

    d989e1c524a6ee9e546c6ddfae7ce5e21c15d6ed

  • SHA256

    d5c7300ccac66d9c7a0b20773cb7ed35bcfeccd1852a97bb648fedfd307fafb0

  • SHA512

    4f41f76a590864931163ee6c3d47b1ba607a434c222ae303c2b2714ac1ae1ddd1a0b5476ca8377cbfc98f52b8c8ae6ced2a5b22999d0aad70d0d5eda618d3b8d

  • SSDEEP

    12288:VMrKy90FDSaqV2ORTdNTwJaLxTJgPRiG3j3aWhzfaAlBRZVPyRq/8pGM:HyCDSVV2opyUJJgPw4Kwr9zRZVKRNT

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      d5c7300ccac66d9c7a0b20773cb7ed35bcfeccd1852a97bb648fedfd307fafb0

    • Size

      656KB

    • MD5

      f589489ffabe3e40459e491b1e41c7b9

    • SHA1

      d989e1c524a6ee9e546c6ddfae7ce5e21c15d6ed

    • SHA256

      d5c7300ccac66d9c7a0b20773cb7ed35bcfeccd1852a97bb648fedfd307fafb0

    • SHA512

      4f41f76a590864931163ee6c3d47b1ba607a434c222ae303c2b2714ac1ae1ddd1a0b5476ca8377cbfc98f52b8c8ae6ced2a5b22999d0aad70d0d5eda618d3b8d

    • SSDEEP

      12288:VMrKy90FDSaqV2ORTdNTwJaLxTJgPRiG3j3aWhzfaAlBRZVPyRq/8pGM:HyCDSVV2opyUJJgPw4Kwr9zRZVKRNT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks