Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    977cb1283020fcf7c702fdaf6ec84822bb0f9486039c53ba538d3a5f0b59dc46

  • Size

    659KB

  • Sample

    231010-l1jr7aef63

  • MD5

    08c1d9376b63d52d4bdade68d3558044

  • SHA1

    4b3fe3b798d22c247ca4cf96d24b6156a252d8f5

  • SHA256

    977cb1283020fcf7c702fdaf6ec84822bb0f9486039c53ba538d3a5f0b59dc46

  • SHA512

    4c8b29eda901bacba102f0b8a32c996f53c13b048e4c72598f368be8b2591f5da9f42464ea01d38db06dd64265e7696b83046e50b28421387d3466bf51456889

  • SSDEEP

    12288:GeqZxuI9HuQQivR5OF+teE2VfTxJhiFgAKvGXp9bogTQelw1qTglJbl07af0ftbp:ujuI9Hx5RjuL9gp/kelw1qTglQaet9

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    premium184.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ^HPUm$4%eL~b

Targets

    • Target

      Remiitance copy.exe

    • Size

      879KB

    • MD5

      c9957168d370ff036e0c72e32b3f49c8

    • SHA1

      4112ea71f673090036871d3ab57a67ddc62f83d5

    • SHA256

      aec5d1b5fa3a905ce36b592492e8a51bfa68503f774724b0f936151f138016fb

    • SHA512

      0d0b0377fcd4861321d68e45a2a75fa50e7ddef9ab9cbe7996b744da541c1aabff8740d68899ade9f6779af471f5b62e19a37230a76a6d95541ea4d1b6274464

    • SSDEEP

      24576:bqGtyT2IyUrb0ZmSmUo9v7IFoKVzvlOE1D6Vf:7MzrbJjKFHzv4AD

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks