Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
b3efe475808245e30ec79c72c4ff4585c1d8fb2e2d6b29e4bfe876776b922a33
-
Size
1.4MB
-
Sample
231112-lrtwssee3w
-
MD5
2b1430d9c2127fcf9436f00f23fae4e9
-
SHA1
babe99a5341d04377e36874d827a771e0df9b2a3
-
SHA256
b3efe475808245e30ec79c72c4ff4585c1d8fb2e2d6b29e4bfe876776b922a33
-
SHA512
521ae1bf678eae8dec0a1841a434457fc7336e0d9f7f7d2f73f34c2e5aace6bc9830b6e20ba2dd2065ea49f7578f4c0ed69b55a0ed14bf774589cfdfc12ad19d
-
SSDEEP
24576:TyXGI5SvYora7e8Is5mhG2uoDPUhp2WGTByVJmpbVACb7+K:mXG/XSers0GuQprYGJmpbVr
Static task
static1
Behavioral task
behavioral1
Sample
b3efe475808245e30ec79c72c4ff4585c1d8fb2e2d6b29e4bfe876776b922a33.exe
Resource
win10-20231025-en
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Extracted
smokeloader
up3
Targets
-
-
Target
b3efe475808245e30ec79c72c4ff4585c1d8fb2e2d6b29e4bfe876776b922a33
-
Size
1.4MB
-
MD5
2b1430d9c2127fcf9436f00f23fae4e9
-
SHA1
babe99a5341d04377e36874d827a771e0df9b2a3
-
SHA256
b3efe475808245e30ec79c72c4ff4585c1d8fb2e2d6b29e4bfe876776b922a33
-
SHA512
521ae1bf678eae8dec0a1841a434457fc7336e0d9f7f7d2f73f34c2e5aace6bc9830b6e20ba2dd2065ea49f7578f4c0ed69b55a0ed14bf774589cfdfc12ad19d
-
SSDEEP
24576:TyXGI5SvYora7e8Is5mhG2uoDPUhp2WGTByVJmpbVACb7+K:mXG/XSers0GuQprYGJmpbVr
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1