Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    file.exe

  • Size

    380KB

  • Sample

    230405-sdbavshe3t

  • MD5

    d4310c99d42ad36aed4679860c1c368b

  • SHA1

    547b0af6d1f0abcea19160d361c4f2e605c3b864

  • SHA256

    5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661

  • SHA512

    41b789467abb3758c50ba8c4410684cb204ccebdc7a972a9ed94b57d63c89352f1333e44ea0f4ca27aa1a29ed6d0ef32f4e4f336ac29ec9ec43256bbc270040c

  • SSDEEP

    6144:x/QiQXCvJm+ksmpk3U9jW1U4P9b4OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZogE:pQi3vs6m6URA3Ph4lL//plmW9bTXeVh8

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/dfgg320/

Extracted

Family

gcleaner

C2

45.12.253.56

45.12.253.72

45.12.253.98

45.12.253.75

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
1
0x33f8f0d2
rc4.i32
1
0xaa0488bb

Targets

    • Target

      file.exe

    • Size

      380KB

    • MD5

      d4310c99d42ad36aed4679860c1c368b

    • SHA1

      547b0af6d1f0abcea19160d361c4f2e605c3b864

    • SHA256

      5531490b3951e8793cb6ee449f75d6fb0b5c1347d1197ccda7ff1b9b15cf9661

    • SHA512

      41b789467abb3758c50ba8c4410684cb204ccebdc7a972a9ed94b57d63c89352f1333e44ea0f4ca27aa1a29ed6d0ef32f4e4f336ac29ec9ec43256bbc270040c

    • SSDEEP

      6144:x/QiQXCvJm+ksmpk3U9jW1U4P9b4OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZogE:pQi3vs6m6URA3Ph4lL//plmW9bTXeVh8

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.