Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302_JC.exe
-
Size
1.2MB
-
Sample
231012-17yx1sdc7t
-
MD5
20495df89962673387ca7b9925e4f434
-
SHA1
73970d9530574f3bd2912ab6dc797391c60d9cfc
-
SHA256
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302
-
SHA512
cdef891691bf2d6ced9c74d662ce7f058548149f7ece07574a52b99421b98da40cd407fcacc9651acace8f4a31fd661bdc5b49e897478e36e27ccfd8b4a8d8e5
-
SSDEEP
24576:wZtQ76aJrc/lYW3RxIZ+MxbcGAVa0Ga7okOMhZ:wZtQeaJrZZ+MxbD+s4MMhZ
Static task
static1
Behavioral task
behavioral1
Sample
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Targets
-
-
Target
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302_JC.exe
-
Size
1.2MB
-
MD5
20495df89962673387ca7b9925e4f434
-
SHA1
73970d9530574f3bd2912ab6dc797391c60d9cfc
-
SHA256
3d4ad0f7c5b92d3dadbc2e789a414b4a074ef92a4fea40ae825e1a3123c24302
-
SHA512
cdef891691bf2d6ced9c74d662ce7f058548149f7ece07574a52b99421b98da40cd407fcacc9651acace8f4a31fd661bdc5b49e897478e36e27ccfd8b4a8d8e5
-
SSDEEP
24576:wZtQ76aJrc/lYW3RxIZ+MxbcGAVa0Ga7okOMhZ:wZtQeaJrZZ+MxbD+s4MMhZ
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1