Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681

  • Size

    1.4MB

  • Sample

    230918-fpzflsfa9v

  • MD5

    eef4e2a2eab0126d6d18cf6ee72e8aac

  • SHA1

    6bbe865a2ae9ddd5360647c101c6f906b2691f4b

  • SHA256

    cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681

  • SHA512

    3f44473339619e9ce098b54957ee9d225295435d37e2ca050708d9932cef8c26fdc0c80a60b95ca0ea6716d45fbe7417268c93e6240d70a197914d8edc2f8693

  • SSDEEP

    24576:C09xpUW51hhXWno0ynuOEkEL0l7JzSpLPdqBvyxwOiNI6LjkRSjE3iQ:C09LpLTRjnB1pxMpLFqBb5LjkRwQ

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d
rc4.plain
1
a091ec0a6e22276a96a99c1d34ef679c

Extracted

Family

redline

Botnet

monik

C2

77.91.124.82:19071

Attributes
  • auth_value

    da7d9ea0878f5901f1f8319d34bdccea

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
1
0x4b3b02b6
rc4.i32
1
0x6ea683ed

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
1
0x33f8f0d2
rc4.i32
1
0xaa0488bb

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Targets

    • Target

      cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681

    • Size

      1.4MB

    • MD5

      eef4e2a2eab0126d6d18cf6ee72e8aac

    • SHA1

      6bbe865a2ae9ddd5360647c101c6f906b2691f4b

    • SHA256

      cac937cc0a22ebdaf3d48b71cc09ef8e0a171a191c5e5ec107e7b97f1770a681

    • SHA512

      3f44473339619e9ce098b54957ee9d225295435d37e2ca050708d9932cef8c26fdc0c80a60b95ca0ea6716d45fbe7417268c93e6240d70a197914d8edc2f8693

    • SSDEEP

      24576:C09xpUW51hhXWno0ynuOEkEL0l7JzSpLPdqBvyxwOiNI6LjkRSjE3iQ:C09LpLTRjnB1pxMpLFqBb5LjkRwQ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Fabookie payload

    • Detected google phishing page

    • Detects Healer an antivirus disabler dropper

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Windows security bypass

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.