Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    NEAS.e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213exe_JC.exe

  • Size

    4.0MB

  • Sample

    231020-ktap9sab58

  • MD5

    7ed069479280add451568981ee74e4fb

  • SHA1

    c41d0182dff37b0127cec82478ac0089b4648d9b

  • SHA256

    e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213

  • SHA512

    cd364f3e8d9048d083567b65747a2a82c9ebffe75fac3bb348bca3a39c167970d1692e26ab5cc59a955655b0994f20092407639871852663cd90cb7d03553d84

  • SSDEEP

    49152:DePIG3Ur7H2s6PTRhiQzF2ekzNztt0CBVzTt+N/5Njc0hhnVTJfbyNvRAn1Iixus:+ArzWC7Ws0gwWy

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://193.42.32.29/9bDc8sQ/index.php

Attributes
  • install_dir

    1ff8bec27e

  • install_file

    nhdues.exe

  • strings_key

    2efe1b48925e9abf268903d42284c46b

rc4.plain
1
a967e0f403b6529be8f6a614d2956809

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

vidar

Version

6.1

Botnet

55d1d90f582be35927dbf245a6a59f6e

C2

https://steamcommunity.com/profiles/76561199563297648

https://t.me/twowheelfun

Attributes
  • profile_id_v2

    55d1d90f582be35927dbf245a6a59f6e

  • user_agent

    Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
1
0x33f8f0d2
rc4.i32
1
0xaa0488bb

Extracted

Family

purecrypter

C2

http://104.194.128.170/svp/Hfxbflp.mp3

Targets

    • Target

      NEAS.e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213exe_JC.exe

    • Size

      4.0MB

    • MD5

      7ed069479280add451568981ee74e4fb

    • SHA1

      c41d0182dff37b0127cec82478ac0089b4648d9b

    • SHA256

      e7268d8c171e77fc209d921f92957eafebfe49d96a697104ce4698ed5a53e213

    • SHA512

      cd364f3e8d9048d083567b65747a2a82c9ebffe75fac3bb348bca3a39c167970d1692e26ab5cc59a955655b0994f20092407639871852663cd90cb7d03553d84

    • SSDEEP

      49152:DePIG3Ur7H2s6PTRhiQzF2ekzNztt0CBVzTt+N/5Njc0hhnVTJfbyNvRAn1Iixus:+ArzWC7Ws0gwWy

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.