Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2

  • Size

    1.7MB

  • Sample

    231005-j9ajrsbe57

  • MD5

    bf11fe97ebffed3ef14a0c2cd06d6ddd

  • SHA1

    d9b3973571af0ef82dd6cbbfb6ac4d444ab42336

  • SHA256

    44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2

  • SHA512

    75f672efc202cf9bb70113eaa5082cc1656491e202895bbc383e2c64da8ddadc3fe43e21bd12239365960b285c4c98b368e816269b7203891c4c6f2ec9627805

  • SSDEEP

    24576:RyMZ30Jj3+0gPl5q8gES9AaZZ6DvnRCufS0014nzVYu39Rece4zDYtH:EMCj+7i8VS9nfavnRCJ4zJ9RCt

Malware Config

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Targets

    • Target

      44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2

    • Size

      1.7MB

    • MD5

      bf11fe97ebffed3ef14a0c2cd06d6ddd

    • SHA1

      d9b3973571af0ef82dd6cbbfb6ac4d444ab42336

    • SHA256

      44b97541252adc5d379af7fcdca20fdeb60656906c454987769792c93a70b4d2

    • SHA512

      75f672efc202cf9bb70113eaa5082cc1656491e202895bbc383e2c64da8ddadc3fe43e21bd12239365960b285c4c98b368e816269b7203891c4c6f2ec9627805

    • SSDEEP

      24576:RyMZ30Jj3+0gPl5q8gES9AaZZ6DvnRCufS0014nzVYu39Rece4zDYtH:EMCj+7i8VS9nfavnRCJ4zJ9RCt

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks