Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f
-
Size
1.2MB
-
Sample
231011-rp3ntaef34
-
MD5
1e2c0032320d6dd14138915551af1491
-
SHA1
1a2b21c64183959f9ef6c9f09d28249eafdf6a6e
-
SHA256
2b3be03b164d8a1402f01d7af563ee9c74c3075ad325716eafa9dcbecdadec17
-
SHA512
d4c0135dd791d910173b4293ac1e96bbbabc869a3951d2733f469a109df4552f8942fef9ed8165025f1c8977317f6d6166c03d2ec9ba81dbbaffa90e76f7e892
-
SSDEEP
24576:amy4YUd2uKRZ+EPm3NpDZk3CN/PGqxIlxVtSWS/lhaTXAdb8krhfDh6T8tIKpSaw:sJua8R3vDZk3C1uD7VvElhaTwd4shZto
Static task
static1
Behavioral task
behavioral1
Sample
d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f
-
Size
1.3MB
-
MD5
5e2c32f1f985780b05f8e27a12974695
-
SHA1
f773e2e9a56b8011cd4606e1593da3d0c2ac70ca
-
SHA256
d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f
-
SHA512
ac4fe96551845033f0d800a2dcb1177426e74322309a47d5bab441d1d205e710d6b4b60ed8309409b5c45d77c403ce32c9427fd64d56d2f068df219430d8f0d8
-
SSDEEP
24576:myEPmuKRD+EPw3NpjZI3CN3PEEjIdTYsupa/lvKTXAdl8l3hfDh6T8tOcpEIHvl:1AmuaCZ3vjZI3CZcNJYGlvKTwd+1hjtn
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1