Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    0c62b9103f8ddc9cb5c17c5f4773cfa37136a1c40c666b6d907fd11313141d43

  • Size

    582KB

  • Sample

    230616-zn4tgsgf84

  • MD5

    b095c24c41430b27208ce9c5b9cb247a

  • SHA1

    5cb5be6bd96a91a300211a20f255a8cd7f4db65a

  • SHA256

    0c62b9103f8ddc9cb5c17c5f4773cfa37136a1c40c666b6d907fd11313141d43

  • SHA512

    b0a5a2e6339915178067bb2bc85ab8765cecba7b5cf706d3e137d220dfcea036a1b539b19998c5143ddfa328d5a79fcf92923c6526a84840c7cdcd384b3cc2df

  • SSDEEP

    12288:sMriy90k5RC+i6fyW08FqaUMp9M1UT/Yv80sn4h2:Oya+yWFRUMs1K/Yv4nv

Malware Config

Extracted

Family

redline

Botnet

dedo

C2

83.97.73.130:19061

Attributes
  • auth_value

    ac76f7438fbe49011f900c651cb85e26

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

grega

C2

83.97.73.130:19061

Attributes
  • auth_value

    16e2fbc2847b2270b3f0679e2dd76c8d

Targets

    • Target

      0c62b9103f8ddc9cb5c17c5f4773cfa37136a1c40c666b6d907fd11313141d43

    • Size

      582KB

    • MD5

      b095c24c41430b27208ce9c5b9cb247a

    • SHA1

      5cb5be6bd96a91a300211a20f255a8cd7f4db65a

    • SHA256

      0c62b9103f8ddc9cb5c17c5f4773cfa37136a1c40c666b6d907fd11313141d43

    • SHA512

      b0a5a2e6339915178067bb2bc85ab8765cecba7b5cf706d3e137d220dfcea036a1b539b19998c5143ddfa328d5a79fcf92923c6526a84840c7cdcd384b3cc2df

    • SSDEEP

      12288:sMriy90k5RC+i6fyW08FqaUMp9M1UT/Yv80sn4h2:Oya+yWFRUMs1K/Yv4nv

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks