Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24

  • Size

    1.0MB

  • Sample

    230327-s6fq2seb42

  • MD5

    08cfbebed9d45e92f60bab072cc8f00c

  • SHA1

    0db77a23d922688f901a7a02b5be14b05559db67

  • SHA256

    5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24

  • SHA512

    fb2891dac5bfc0cff6ac02c9458813a6d2f9ebc4756cfeeebfeb6b267113778505f35e46fb2bf22f8f21a42a872fa8b49a6f8126990389aef44301a91d152bd1

  • SSDEEP

    24576:XyDthCpXXqp+ZujWC7WKaEvRF8aK+A+mG6CK2JkNZq:iDthIZ8F7PtZF8V+dmRCFmZ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24

    • Size

      1.0MB

    • MD5

      08cfbebed9d45e92f60bab072cc8f00c

    • SHA1

      0db77a23d922688f901a7a02b5be14b05559db67

    • SHA256

      5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24

    • SHA512

      fb2891dac5bfc0cff6ac02c9458813a6d2f9ebc4756cfeeebfeb6b267113778505f35e46fb2bf22f8f21a42a872fa8b49a6f8126990389aef44301a91d152bd1

    • SSDEEP

      24576:XyDthCpXXqp+ZujWC7WKaEvRF8aK+A+mG6CK2JkNZq:iDthIZ8F7PtZF8V+dmRCFmZ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks