Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    NEAS.56df87530d94170d58020ed2302a6610f69a73b63235acc7a6724892ab573674_JC.exe

  • Size

    851KB

  • Sample

    231007-n6z3gabg8w

  • MD5

    332be1fd1afc1ede533225df48f347a6

  • SHA1

    ab007191fcbe1bcf3ac12ae4e02b52be4021b386

  • SHA256

    56df87530d94170d58020ed2302a6610f69a73b63235acc7a6724892ab573674

  • SHA512

    15d2762fdfe564103f6d5f20ec7e83b3861374b9d300abbe25b776876637ca819ffa7f4a7a24d113e7069e9ab6b8ecb3791d3ec2df6bab5495c24e0ff8eaf684

  • SSDEEP

    24576:Lyokio090afwEzoDl/ueBan7URNlto0O6HId9ASfyu:+cIafRzoFBan7URNbo0xoPL

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6415420186:AAFl1R3-Kr5zbvKkeofTPjxvxd9leZKNs2M/sendMessage?chat_id=940609421

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      NEAS.56df87530d94170d58020ed2302a6610f69a73b63235acc7a6724892ab573674_JC.exe

    • Size

      851KB

    • MD5

      332be1fd1afc1ede533225df48f347a6

    • SHA1

      ab007191fcbe1bcf3ac12ae4e02b52be4021b386

    • SHA256

      56df87530d94170d58020ed2302a6610f69a73b63235acc7a6724892ab573674

    • SHA512

      15d2762fdfe564103f6d5f20ec7e83b3861374b9d300abbe25b776876637ca819ffa7f4a7a24d113e7069e9ab6b8ecb3791d3ec2df6bab5495c24e0ff8eaf684

    • SSDEEP

      24576:Lyokio090afwEzoDl/ueBan7URNlto0O6HId9ASfyu:+cIafRzoFBan7URNbo0xoPL

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Async RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks