Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    d6e98ece5d4a74fb005b1c62600b4ceff9ad382b75bf0a101a87b0e561f8e3f1

  • Size

    406KB

  • Sample

    230817-12nj4adh53

  • MD5

    951601a5a17080a61a513dc911b2c99b

  • SHA1

    ff16b8970e924495950f9324bd0dfc60b26c01ad

  • SHA256

    d6e98ece5d4a74fb005b1c62600b4ceff9ad382b75bf0a101a87b0e561f8e3f1

  • SHA512

    c0c514415e71e4249bad044435690632cda210127c1d61ad7590954d080583bd532b1b957bdabb87d2388fd48d4f691d25f2a016f7a3eeb87f3f0a44b99ea971

  • SSDEEP

    6144:8bP7gwQ2P0s/4X4cI8JIiD3J2Mhi9WDOXLjYaSa8wYFOWuZqX0JlKWQDw8BuzraK:8/gYgX4MQb4M8tC00e5U8oaSHA0

Malware Config

Targets

    • Target

      Purchase Order.exe

    • Size

      896KB

    • MD5

      9a2490d08606de9935c8f139226b9498

    • SHA1

      dbb715d5bf8a9cbdd44707571b2481a319554bff

    • SHA256

      b4addefb06b052219b202d98c71d5bde9aee375ba5b31dc8460bc2939099d19e

    • SHA512

      8ef5fdd8865d0083723f2d2d62a44f73856be6b27d9e45ad17ff99516841499fc32792b17057f109c65781ed07ae344d48876f964bfabfc6ce4a816666a5eeef

    • SSDEEP

      12288:+T6qMTTxTaJfHdmMTa9IubWFaxDfdjDaZ9bMT:+TrGevYMTa9tSadjWb

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks