Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e

  • Size

    1.0MB

  • Sample

    230412-rgbv5aec2v

  • MD5

    fb5b9a86aae814f1733fe3c5ccf06776

  • SHA1

    0a3f267eff792f4aa08c078f0661f75b18d69d1d

  • SHA256

    03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e

  • SHA512

    029ea1e3337dd4efcd191be5f12b66bf023f364ab45c0a9bae610ce3c859e1329f06d6fd80663bc079ec27c1df7dc150dd2dcd6e171edc74e523b6291752783f

  • SSDEEP

    24576:YymQ5DwjxMQXMoOBOPGQbAPvp8PD15zGZXKGxuX9s2uis1:fmgEqQvOOPDbCvp8Zmduts3N

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e

    • Size

      1.0MB

    • MD5

      fb5b9a86aae814f1733fe3c5ccf06776

    • SHA1

      0a3f267eff792f4aa08c078f0661f75b18d69d1d

    • SHA256

      03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e

    • SHA512

      029ea1e3337dd4efcd191be5f12b66bf023f364ab45c0a9bae610ce3c859e1329f06d6fd80663bc079ec27c1df7dc150dd2dcd6e171edc74e523b6291752783f

    • SSDEEP

      24576:YymQ5DwjxMQXMoOBOPGQbAPvp8PD15zGZXKGxuX9s2uis1:fmgEqQvOOPDbCvp8Zmduts3N

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks