Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b

  • Size

    1.4MB

  • Sample

    230503-1xpllagg68

  • MD5

    618dd2dc23d3793e80b51d6e68a19e8a

  • SHA1

    9da066e0639521fd35c5eff02bf35ec3ebad9ae2

  • SHA256

    889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b

  • SHA512

    f76b2633d6e9785e3fd9e4eb4aaf233a49383301f24e5c0b3b29a7b1f7b99e41dd2b852d1e0b8b71d949ea9e0a8a0a08affa29d62b145b3324e0054ecce25557

  • SSDEEP

    24576:vytSnmM/cZawZ9VBLKLdG00nttFXGxW57M2WVciGWAC/tpCpZAvQfP7uU:6t5JZDFhdnt7XGMdvfWkAvoz

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b

    • Size

      1.4MB

    • MD5

      618dd2dc23d3793e80b51d6e68a19e8a

    • SHA1

      9da066e0639521fd35c5eff02bf35ec3ebad9ae2

    • SHA256

      889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b

    • SHA512

      f76b2633d6e9785e3fd9e4eb4aaf233a49383301f24e5c0b3b29a7b1f7b99e41dd2b852d1e0b8b71d949ea9e0a8a0a08affa29d62b145b3324e0054ecce25557

    • SSDEEP

      24576:vytSnmM/cZawZ9VBLKLdG00nttFXGxW57M2WVciGWAC/tpCpZAvQfP7uU:6t5JZDFhdnt7XGMdvfWkAvoz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks