Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7

  • Size

    588KB

  • Sample

    230505-wzfdgseg6v

  • MD5

    c79334e0be85c01fd5dabb6428a11734

  • SHA1

    de4bd202c8d619720e42bc5d9167cb7c47991649

  • SHA256

    44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7

  • SHA512

    70cf85d042f404ed809049454f775d0c8a22431536ff03dc1d6ba0cc01f277ff05402e1a40eecc650a554cdaaf21a193703727b9405a0020f7dc86e5e226063a

  • SSDEEP

    12288:WMrfy90BLjvacid38PrwogypyFzf0m2KBJaNVfjtl+K5uWph:pyq31iNceysWm2gJaXxroWph

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7

    • Size

      588KB

    • MD5

      c79334e0be85c01fd5dabb6428a11734

    • SHA1

      de4bd202c8d619720e42bc5d9167cb7c47991649

    • SHA256

      44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7

    • SHA512

      70cf85d042f404ed809049454f775d0c8a22431536ff03dc1d6ba0cc01f277ff05402e1a40eecc650a554cdaaf21a193703727b9405a0020f7dc86e5e226063a

    • SSDEEP

      12288:WMrfy90BLjvacid38PrwogypyFzf0m2KBJaNVfjtl+K5uWph:pyq31iNceysWm2gJaXxroWph

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.