Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
malware.zip
-
Size
75.2MB
-
Sample
230916-rv1reaba91
-
MD5
9c5d4fde9036434c02da795d079f0651
-
SHA1
e57b24f74086c01f46b4d814688415c27a5e0068
-
SHA256
ffb44a5388958cda3be00af5170e3fa51c5bc59e7b6ea659836417a17594d18c
-
SHA512
1f956bf4f628553e88850d045cea9a5e09fb43c2a00b6311c4df2245535acfdaf6c5256ece4104df07ed9c69e15a033a2748ad2eaa4f17634ab6e8c32cffda0f
-
SSDEEP
1572864:jO3K/oykFae+/XkNwJ3ncS9pLkFg4FR40rbvXFahEvRY/Qj:K3K/jkFLobLkl40PvXpK/q
Behavioral task
behavioral1
Sample
malware.zip
Resource
win7-20230831-en
Malware Config
Extracted
laplas
clipper.guru
-
api_key
5ef1aac7b3430729f6cbc95fb4d2d2a62582e7382955ffc87026077cb28ab31e
Extracted
rhadamanthys
http://195.3.223.120/blob/fullidao.tk
http://195.3.223.120/blob/fulliano.tk
http://195.3.223.120/blob/luciano.tk
http://195.3.223.120/blob/gotto.tk
Extracted
aurora
185.239.239.194:8081
Extracted
agenttesla
https://discord.com/api/webhooks/1052047387167838281/ckxOZHqDK9Fs6wm9uehtyNosd3HZGLhQFPhbdBDnWi6cl945WnENSlc0bCmlN0xY5VHH
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Targets
-
-
Target
malware.zip
-
Size
75.2MB
-
MD5
9c5d4fde9036434c02da795d079f0651
-
SHA1
e57b24f74086c01f46b4d814688415c27a5e0068
-
SHA256
ffb44a5388958cda3be00af5170e3fa51c5bc59e7b6ea659836417a17594d18c
-
SHA512
1f956bf4f628553e88850d045cea9a5e09fb43c2a00b6311c4df2245535acfdaf6c5256ece4104df07ed9c69e15a033a2748ad2eaa4f17634ab6e8c32cffda0f
-
SSDEEP
1572864:jO3K/oykFae+/XkNwJ3ncS9pLkFg4FR40rbvXFahEvRY/Qj:K3K/jkFLobLkl40PvXpK/q
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1