Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb

  • Size

    1.1MB

  • Sample

    230321-e9dh7sag6s

  • MD5

    b9377e751e52ce52d7e83c9c6c2ce2c0

  • SHA1

    95108ae043f232e3400a2a9ab7b8b52328e779a6

  • SHA256

    e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb

  • SHA512

    47989864307d140e1e7a97587c3e205d0fd970d09533a7e84684efcd0e2260dfd441d35f4f56447dc504caa03b7c1799389e48477f88c871bafc27a5b550137a

  • SSDEEP

    24576:E4AcEx/hs3r6vdtJSqWH842B+q0MjUTFnhIRsEMTXPUOsEnmA1Ku:EpZxJsbyRSUfB+qaORsNPxnmKK

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb

    • Size

      1.1MB

    • MD5

      b9377e751e52ce52d7e83c9c6c2ce2c0

    • SHA1

      95108ae043f232e3400a2a9ab7b8b52328e779a6

    • SHA256

      e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb

    • SHA512

      47989864307d140e1e7a97587c3e205d0fd970d09533a7e84684efcd0e2260dfd441d35f4f56447dc504caa03b7c1799389e48477f88c871bafc27a5b550137a

    • SSDEEP

      24576:E4AcEx/hs3r6vdtJSqWH842B+q0MjUTFnhIRsEMTXPUOsEnmA1Ku:EpZxJsbyRSUfB+qaORsNPxnmKK

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks