Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    95df50da23e3ae43956436ada4801e21160a6844188bd9f6c50a43440cdb395a

  • Size

    246KB

  • Sample

    231011-frs2lsdd38

  • MD5

    4669feb426d03584eb8a4e16df0eb88b

  • SHA1

    a538c2dabf5d367bb242f54f5f5c763a0e9abfe6

  • SHA256

    95df50da23e3ae43956436ada4801e21160a6844188bd9f6c50a43440cdb395a

  • SHA512

    cd82fc0199609930d54fd0a9ad9eaf531b0bced0769b446043972d9da8f4307ff6cb0aa13a81df73c32b5f748c360f3f9667680608c26499c8dd5bb3b232cbac

  • SSDEEP

    6144:nkz4SHy5uoBMFGV5PEkIXEHvZAO0DaBuJ8WVs0BC+:/CmuoBMUOMxKm+s0BC+

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
1
0x4b3b02b6
rc4.i32
1
0x6ea683ed

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

redline

Botnet

pixelscloud

C2

85.209.176.171:80

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
1
0x33f8f0d2
rc4.i32
1
0xaa0488bb

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      95df50da23e3ae43956436ada4801e21160a6844188bd9f6c50a43440cdb395a

    • Size

      246KB

    • MD5

      4669feb426d03584eb8a4e16df0eb88b

    • SHA1

      a538c2dabf5d367bb242f54f5f5c763a0e9abfe6

    • SHA256

      95df50da23e3ae43956436ada4801e21160a6844188bd9f6c50a43440cdb395a

    • SHA512

      cd82fc0199609930d54fd0a9ad9eaf531b0bced0769b446043972d9da8f4307ff6cb0aa13a81df73c32b5f748c360f3f9667680608c26499c8dd5bb3b232cbac

    • SSDEEP

      6144:nkz4SHy5uoBMFGV5PEkIXEHvZAO0DaBuJ8WVs0BC+:/CmuoBMUOMxKm+s0BC+

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detected google phishing page

    • Detects Healer an antivirus disabler dropper

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.