Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    333413d3a10dbf3bf121d1ab4b866346.exe

  • Size

    2.3MB

  • Sample

    230713-xlbzksbb7v

  • MD5

    333413d3a10dbf3bf121d1ab4b866346

  • SHA1

    e4ab9d6bbc56e1c48c2a444cf885833af963fd09

  • SHA256

    7ca900970ade7ffa3ce2cfb9e45f90575e361053749dc0cc3406bd2bebaff842

  • SHA512

    59f4248caeab1f870b0614930ba3894e30716c938df35894f25372257d608135b3c93d233edcb3fd6b8f3e391925612880d5c4e5b65336d3be5aa0d026381c20

  • SSDEEP

    49152:INaBz16Zarg7zdXaCVCPr5szFTBwWGZfr9KWz/:Ia8YQsfPrUlyWGF4Wz/

Malware Config

Targets

    • Target

      333413d3a10dbf3bf121d1ab4b866346.exe

    • Size

      2.3MB

    • MD5

      333413d3a10dbf3bf121d1ab4b866346

    • SHA1

      e4ab9d6bbc56e1c48c2a444cf885833af963fd09

    • SHA256

      7ca900970ade7ffa3ce2cfb9e45f90575e361053749dc0cc3406bd2bebaff842

    • SHA512

      59f4248caeab1f870b0614930ba3894e30716c938df35894f25372257d608135b3c93d233edcb3fd6b8f3e391925612880d5c4e5b65336d3be5aa0d026381c20

    • SSDEEP

      49152:INaBz16Zarg7zdXaCVCPr5szFTBwWGZfr9KWz/:Ia8YQsfPrUlyWGF4Wz/

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks