Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
83b8a52adde102c118a5c8a47fc9e83155601e0ab423b1887fa68a5e34cce1e6
-
Size
1.9MB
-
Sample
231226-s8h9ysgbf4
-
MD5
c9061cd4a92d1938ca23062e8b671506
-
SHA1
b76795dc9fe7c1241d847986971f0bc10b80c83b
-
SHA256
83b8a52adde102c118a5c8a47fc9e83155601e0ab423b1887fa68a5e34cce1e6
-
SHA512
e5c90ce75b7e109170c7fb5b13ea8835381e5e1cc9c20fc93e640e22fa6beae89efaecb111b41e6940b06ab03eb4fb74008f07fe04cef3219588d1be530275a1
-
SSDEEP
49152:hK+wCuDIEZFVCEcSDBtAhgK+BWMgVS6hiwdd8T4C6SEY:A+TOFukVxUYUdu4Q
Static task
static1
Behavioral task
behavioral1
Sample
BakerBoostApp.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BakerBoostApp.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Пак/Специальн. твики/1_Activator.bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Пак/Специальн. твики/1_Activator.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Пак/Специальн. твики/Network_Tweaks.bat
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Пак/Специальн. твики/Network_Tweaks.bat
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
BakerBoostApp.msi
-
Size
5.9MB
-
MD5
9a05e7497c5a2baee4b4c314e832092e
-
SHA1
cbd8cdae6c39e1febcd52302d217e9cfec85ce6a
-
SHA256
0983c7e6d076e8006fa88d51e1363f275e009d6aa104eeab75cb6d228d708f38
-
SHA512
d837c08d8f38925bd8056e3a70d62299a84c0eba01e272a7ff5239f83e889c72f7e3e1e9be400cebf66d2c66fc4210f037aa69d89d51a8c33323d9400bb76f79
-
SSDEEP
49152:zJrYicL5MDwBMmImZTWsQcqh1fdG1CYlhazcpA3W6O4Ho9vH:1Yic5M/kTjAdGngimOx/
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
setup.exe
-
Size
539KB
-
MD5
41dd876f3e3fdb7a9bdafffddff56e7b
-
SHA1
049752dfe1e0021935ab30342dc770cbe9aaca10
-
SHA256
001f5cd5b1bf24a3a3140001e2b96dc32eab16003f22157f932a4e0736c9bec7
-
SHA512
dc2697a6b819948e1b8c0f3fab62bf71e474b57fd3806aa610d68e5e0365845d77aab61610d5e76db4d2080805e96c478d994898de260d64d86019659ccd7cef
-
SSDEEP
12288:IuGj5je69oqAmj5oMqKyKAuqOAP0wuNeMb01JQntLOCHoo0H:IXhe29AmjkKuuNemHox
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Пак/Специальн. твики/1_Activator.bat
-
Size
170B
-
MD5
320dc8a4d9e97961b23b03cdb6b3d0bb
-
SHA1
e8a0471f86f16ad26cca41d4db11a1b10ef3629d
-
SHA256
c686eaffb8fe5ed546d9512510f6e2f4ef7386ce9154c04a80c18c5aa4d6037f
-
SHA512
c1c7035944ff10fc211d18d43b8ef98e9bf7efd2753c4e501cad44e4f6a7eb2afb5a6d07a2a3ef6360d215282089840104ddbbdc8b6b65294a3ea60e542e5613
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Пак/Специальн. твики/Network_Tweaks.bat
-
Size
3KB
-
MD5
257c9ccd5fa59498dbfcf75b07f30a73
-
SHA1
cd333e7847a91200d7281bc6d14f864908b1acfd
-
SHA256
d0a0f15415723601124794ccf93271fb5fac14b7c00c160dbddb7794968e802f
-
SHA512
26ebdc68c18a3006972030e32b05b69a9d949e10a312833818749aa109065f359a5eb5346d8ffe6c99dc3fc98f55aa7d384247d3e9fd3166605bbe901e4033f7
Score1/10 -