Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6

  • Size

    567KB

  • Sample

    230505-w61yrsfg4s

  • MD5

    a157fe746b8c15a8bd7fb48c9b5fbd15

  • SHA1

    92daa1783007bd8a92bce910b3efeeb1b6236bc2

  • SHA256

    797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6

  • SHA512

    a4ec5a08d0ef7d1849ad7b76af5d2c892baa76071eef9bf9efb03bdac98974afb20933d7206525d6b1daec0d31b42218631e21d24e86aac5ca64d1eb8b6041a7

  • SSDEEP

    12288:ZMr1y90nxSG3iHbnfRHlgkFYEJqQZZxXL7ajaoktxOR:Iys3WjNlXxq0L7maTk

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6

    • Size

      567KB

    • MD5

      a157fe746b8c15a8bd7fb48c9b5fbd15

    • SHA1

      92daa1783007bd8a92bce910b3efeeb1b6236bc2

    • SHA256

      797a5fd32370cc0247f1b8e3b7e262007b9b60afc1cdd5883f2c033479f5b7b6

    • SHA512

      a4ec5a08d0ef7d1849ad7b76af5d2c892baa76071eef9bf9efb03bdac98974afb20933d7206525d6b1daec0d31b42218631e21d24e86aac5ca64d1eb8b6041a7

    • SSDEEP

      12288:ZMr1y90nxSG3iHbnfRHlgkFYEJqQZZxXL7ajaoktxOR:Iys3WjNlXxq0L7maTk

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks