Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/11/2023, 19:12
231117-xwf2aaeb6w 1013/11/2023, 20:48
231113-zlyjpafe33 1011/11/2023, 00:27
231111-asanrsce88 1026/10/2023, 01:21
231026-bqq4eaae92 1017/10/2023, 19:09
231017-xt332ahd24 1014/10/2023, 18:16
231014-wwjlqsgc23 1008/10/2023, 21:51
231008-1qgmeagc31 1003/10/2023, 17:46
231003-wckppaed21 10General
-
Target
New Text Document.exe
-
Size
4KB
-
Sample
231017-xt332ahd24
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Static task
static1
Malware Config
Extracted
stealc
http://elijahdiego.top
-
url_path
/e9c345fc99a4e67e.php
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
method5000@ - Email To:
[email protected]
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
agenttesla
Protocol: smtp- Host:
mail.mindcoach.edu.vn - Port:
587 - Username:
[email protected] - Password:
supportmc2023 - Email To:
[email protected]
Extracted
formbook
4.1
o5gu
jonathanvuportfolio.website
moneyboost.net
imikecutyou.com
toollessassembling.com
keoinfra.com
mackenziejamesphoto.com
zenovaa.com
ngmnetwork.com
odropoficial.com
huyangli.company
ganjajuice.info
promptmechanic.xyz
crispyjoy.com
dinevintageshirts.com
heyxop.online
hopefinancialmarketingph.com
weeklyvolcano.app
consultoriopmn.com
seetheratequote.com
ftds77.com
neuepilates.com
akaegostudios.com
solhealthglobal.com
edelweiss45.online
getalign.info
playermaveric.click
osuszdom.com
eastern-prime.com
4zc.lat
ssongg3888.cfd
polar-tours.com
herbahis239.com
funeral-services.com
chawlaaluminium.com
aintrepreneurship.com
chiefsuppliesllc.com
easyhub.xyz
umaylek.site
menofthehouse.store
11cmace.vip
mostbet-wcx4.top
robbiexgeorgie.com
elliotlakefield.com
marcjacobssalecanada.com
barbiealien.com
mcfeeinsurance.com
hk-newbie.com
sportscolorslove.com
zabarofficial.com
seva.fund
lion-sales.com
jebwallet.app
appsrocky.top
viruceaseusa.com
aaronlea.design
lyftpassengerslawyers.com
defiacquisition.com
iuzswq.top
acreeksis.online
rkautomationservice.com
pkn910.com
sykdnxjxbyu.xyz
hegre-shaved-girls.com
scentwithluv.com
felix-froehlich.com
Targets
-
-
Target
New Text Document.exe
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Formbook payload
-
XMRig Miner payload
-
Contacts a large (1210) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Stops running service(s)
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1