Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
-
Size
342KB
-
Sample
231115-vk48maeb5s
-
MD5
07ea9abe8aeda1c72f42967c7d9f475a
-
SHA1
5f495b957acc693e5019ee2ccb5a1f458286f67f
-
SHA256
a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a
-
SHA512
8cbdfc199506f980e282b93691bcf97b09d1d0617e9a533785a67f54e2ed267e0a957181deea3d958b46c48058531004a99456790cb1f24ba7455e9186fa2e53
-
SSDEEP
6144:wBlL/90OO8k3NWzK22YTzxAdhlpOxWe+mJ/0u4p6+zTV28BkvTXR:C/0Oe3NWh2dhoWG/0u4s+fyXR
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
Resource
win7-20231023-en
Malware Config
Extracted
formbook
4.1
fs35
latechdz.com
sdp-ploce.com
ss203.site
sm6yuy.net
needstothink.com
heginstwp.com
blueplumespirit.com
vemconferirshop.click
yorent-auto.com
eleononaly.com
medicalspacelocators.com
7law.info
imacanberra.online
bbtyss.top
onlyanfans.com
varenty.com
fappies.shop
313865.com
hongpools.com
babkacuisine.xyz
usofty.com
jdjnxsu.com
teammonitoringservices.com
retortprocessinglab.com
rooferstakeoff.com
hansonelecs.com
em4ai.com
urbiznet.com
merchantgeniussaiyanflame.com
elegance-x-agency.com
cheekyfancy.com
ciaraile-hair.store
exactix.online
essentiallymotherearth.com
thebrollybuddy.com
associacaoacademicaguarda.com
manjort.xyz
mylifestylelounge.com
ser25kgr.monster
abbiejhooper.xyz
mjp77.com
dompompomdompom.shop
sugikougei.com
tacosantojrz.com
7yyhdjwwqq.com
vri4d.com
53b9fd8cfbfb.info
xlookcoins.top
uncongneniality.shop
coats-34172.bond
amazingpawpalace.com
actionkillsfear.com
supportlakecentral.com
xn--9kq7ik28o.club
lasermywords.com
t5-1682468.xyz
eastonelitesoftball.com
bagpackgalaxy.com
petlove6.com
fryconnect.online
autolusaccess.com
planetbravos.com
80smaoi.top
iit.world
i-ooedo.com
Targets
-
-
Target
NEAS.a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a.exe
-
Size
342KB
-
MD5
07ea9abe8aeda1c72f42967c7d9f475a
-
SHA1
5f495b957acc693e5019ee2ccb5a1f458286f67f
-
SHA256
a0a6a1c54775713ad3e884b6bc49f2c74f393464a69175c8713221504ae6d72a
-
SHA512
8cbdfc199506f980e282b93691bcf97b09d1d0617e9a533785a67f54e2ed267e0a957181deea3d958b46c48058531004a99456790cb1f24ba7455e9186fa2e53
-
SSDEEP
6144:wBlL/90OO8k3NWzK22YTzxAdhlpOxWe+mJ/0u4p6+zTV28BkvTXR:C/0Oe3NWh2dhoWG/0u4s+fyXR
-
Formbook payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-