Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    83ef58f863fb2b67a26b04fe27109b8f1712d523d5c7f6d83b745e2244a88e4a

  • Size

    656KB

  • Sample

    230317-a8t3caff9y

  • MD5

    43c23c1936b84b2182ca1803bc90ca59

  • SHA1

    601599c1b5e5fa74f9cfeb08b4105f2a271fa644

  • SHA256

    83ef58f863fb2b67a26b04fe27109b8f1712d523d5c7f6d83b745e2244a88e4a

  • SHA512

    bad4b5cbfcec39137e7b57001f16d4336feadfe46ae662d26b0cb3d53bb0cb7167cd9a05cdd4153e5a8137e9a975c82eb5c2b943cccfab477e2bcbd78eb60ae9

  • SSDEEP

    12288:DMrxy90K/yNr5+X2o1mYOve9avK3kfMPpfLWCw9BOv:my/yN1+X2hYOvSs1MfLWr9Av

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      83ef58f863fb2b67a26b04fe27109b8f1712d523d5c7f6d83b745e2244a88e4a

    • Size

      656KB

    • MD5

      43c23c1936b84b2182ca1803bc90ca59

    • SHA1

      601599c1b5e5fa74f9cfeb08b4105f2a271fa644

    • SHA256

      83ef58f863fb2b67a26b04fe27109b8f1712d523d5c7f6d83b745e2244a88e4a

    • SHA512

      bad4b5cbfcec39137e7b57001f16d4336feadfe46ae662d26b0cb3d53bb0cb7167cd9a05cdd4153e5a8137e9a975c82eb5c2b943cccfab477e2bcbd78eb60ae9

    • SSDEEP

      12288:DMrxy90K/yNr5+X2o1mYOve9avK3kfMPpfLWCw9BOv:my/yN1+X2hYOvSs1MfLWr9Av

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks