Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8e9f2145192479dc19b59b5a249f4796.exe

  • Size

    320KB

  • Sample

    230710-zas5tsed71

  • MD5

    8e9f2145192479dc19b59b5a249f4796

  • SHA1

    c872d174e9b477d7b398c86845725d9adae1b07b

  • SHA256

    249ff8adcaf0914424769055cc293a3114a071fd260073de2455d6f501971aa2

  • SHA512

    7280ce7a7c31e6c6ca48ca7846fb9913db6b37a5e86fb1b62d7fd166c1e8b396f78b11ac12d233d0aa3471827f714e63c3323797dc118031c13294e9fed632ef

  • SSDEEP

    6144:tMSkLLOAG3gvMges35/hw+2gcu3rIS6zLgYRmajD:LkvXG3gvMgXw+2gcup6n0

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      8e9f2145192479dc19b59b5a249f4796.exe

    • Size

      320KB

    • MD5

      8e9f2145192479dc19b59b5a249f4796

    • SHA1

      c872d174e9b477d7b398c86845725d9adae1b07b

    • SHA256

      249ff8adcaf0914424769055cc293a3114a071fd260073de2455d6f501971aa2

    • SHA512

      7280ce7a7c31e6c6ca48ca7846fb9913db6b37a5e86fb1b62d7fd166c1e8b396f78b11ac12d233d0aa3471827f714e63c3323797dc118031c13294e9fed632ef

    • SSDEEP

      6144:tMSkLLOAG3gvMges35/hw+2gcu3rIS6zLgYRmajD:LkvXG3gvMgXw+2gcup6n0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks