Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62
-
Size
3.1MB
-
Sample
231014-bjzf7shb9z
-
MD5
a2025e7e3aafc5626ff6f6006e55ff1a
-
SHA1
46a2e3ba3c5ac7cf8b487bff576ce89f999d731c
-
SHA256
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62
-
SHA512
58f31b27711bf02d6b8f22a8322c18944194bd3cb3a9a9d584e5c6318a20648fb6e77bbe374f9993f53acfebec21531a6363652288682a797d734dfa3cf94de6
-
SSDEEP
49152:DNiDVNnhrihRC8cs6a3vTWpJZSgvZUq2bS720DnT3u0iG6oOlGn4X/:DNDhksWpJAgCB+720Xu0X6op4X
Static task
static1
Behavioral task
behavioral1
Sample
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62
-
Size
3.1MB
-
MD5
a2025e7e3aafc5626ff6f6006e55ff1a
-
SHA1
46a2e3ba3c5ac7cf8b487bff576ce89f999d731c
-
SHA256
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62
-
SHA512
58f31b27711bf02d6b8f22a8322c18944194bd3cb3a9a9d584e5c6318a20648fb6e77bbe374f9993f53acfebec21531a6363652288682a797d734dfa3cf94de6
-
SSDEEP
49152:DNiDVNnhrihRC8cs6a3vTWpJZSgvZUq2bS720DnT3u0iG6oOlGn4X/:DNDhksWpJAgCB+720Xu0X6op4X
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1