Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25

  • Size

    1.2MB

  • Sample

    230413-esvfdsaf61

  • MD5

    b2be3348fc58dc12e34c1f20ac3492d9

  • SHA1

    0d9e6df4a30807b4047015fe16f03ad9808b5620

  • SHA256

    5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25

  • SHA512

    636b3e099d315cc93245cd67a977c653349dafb7995706ac8e29f49404b45cabac2d79754e4baedc9be526885eb6eda86d12286fd07a4a97bcb59c4986863f41

  • SSDEEP

    24576:+yzWXa92Ge5+xKa9ra5lD0rcVVZB+huvLzFim8GdFrpWI7doY2bPhJxk:NaK9Te+xKaFaHqmVVP38G1doTNJ

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25

    • Size

      1.2MB

    • MD5

      b2be3348fc58dc12e34c1f20ac3492d9

    • SHA1

      0d9e6df4a30807b4047015fe16f03ad9808b5620

    • SHA256

      5d5ddfff4ee15c636021cd16e6ed2fa6e81938e8593df19e5b4aeb76e00a7d25

    • SHA512

      636b3e099d315cc93245cd67a977c653349dafb7995706ac8e29f49404b45cabac2d79754e4baedc9be526885eb6eda86d12286fd07a4a97bcb59c4986863f41

    • SSDEEP

      24576:+yzWXa92Ge5+xKa9ra5lD0rcVVZB+huvLzFim8GdFrpWI7doY2bPhJxk:NaK9Te+xKaFaHqmVVP38G1doTNJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.