Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736.bin

  • Size

    864KB

  • Sample

    230501-xprjfaeg63

  • MD5

    5e65c7e1507aa3913b25c28ecaeda200

  • SHA1

    1e23dd144ca411681049f5af45009ed7188e299d

  • SHA256

    ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736

  • SHA512

    cfab0605606d3c47b2815f149e237fbd7e918753ce3668e6ac312389d2325ca29e20b0694a80440cf6cb9dd48ff79a5473a62f7fab61f8b82a9cc9027195405c

  • SSDEEP

    24576:myekVHws4Kma2UNXJ3E0mEbEqm+N2DV7:1ekVQslxzXmpciV

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736.bin

    • Size

      864KB

    • MD5

      5e65c7e1507aa3913b25c28ecaeda200

    • SHA1

      1e23dd144ca411681049f5af45009ed7188e299d

    • SHA256

      ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736

    • SHA512

      cfab0605606d3c47b2815f149e237fbd7e918753ce3668e6ac312389d2325ca29e20b0694a80440cf6cb9dd48ff79a5473a62f7fab61f8b82a9cc9027195405c

    • SSDEEP

      24576:myekVHws4Kma2UNXJ3E0mEbEqm+N2DV7:1ekVQslxzXmpciV

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks