Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    dfc49c066d411881618f3fbc335f5d21eab991da2a5ceb666570d2a9221af049

  • Size

    924KB

  • Sample

    230411-amxw4shd64

  • MD5

    1e9a95da9ec230898460273151df6dbd

  • SHA1

    1b10ea8beef0775359cd5dc8cb37e202eb968f5d

  • SHA256

    dfc49c066d411881618f3fbc335f5d21eab991da2a5ceb666570d2a9221af049

  • SHA512

    a877fa638c749b3afc6e5f096442e5594127715a0c5a6dc4141ec9efd46c279f59dd11a883191abc2d321ea25461d1c6d2c7b506b93dfc6d1e0479af6fe6f6e8

  • SSDEEP

    24576:NyJfelmsjdjGPCybReq7LjJ1SImGQnWmgdp:oJfim6dhm/SImGQ8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Targets

    • Target

      dfc49c066d411881618f3fbc335f5d21eab991da2a5ceb666570d2a9221af049

    • Size

      924KB

    • MD5

      1e9a95da9ec230898460273151df6dbd

    • SHA1

      1b10ea8beef0775359cd5dc8cb37e202eb968f5d

    • SHA256

      dfc49c066d411881618f3fbc335f5d21eab991da2a5ceb666570d2a9221af049

    • SHA512

      a877fa638c749b3afc6e5f096442e5594127715a0c5a6dc4141ec9efd46c279f59dd11a883191abc2d321ea25461d1c6d2c7b506b93dfc6d1e0479af6fe6f6e8

    • SSDEEP

      24576:NyJfelmsjdjGPCybReq7LjJ1SImGQnWmgdp:oJfim6dhm/SImGQ8

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks