Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
6f803ef93ff43f7ca1c58a4da0a93e0f
-
Size
5.2MB
-
Sample
240122-m4f15sfbg8
-
MD5
6f803ef93ff43f7ca1c58a4da0a93e0f
-
SHA1
edfcb91cfc368a096541393cbea32fc42954336b
-
SHA256
bda2b27d917dc919d2df7f2768a5d20f4f554e6f0eeb687f5ac45b53aecbb2f3
-
SHA512
9a6b30821cb36ed1634bd9f962bf4c71a61ccff8ec67c317dab3655104faad9f62ec869a4a1c9032f218308d77e0b26c1a0f08c777109faad17e0037ef684235
-
SSDEEP
98304:yYgYhpOqywS4gcAXVaOjV3XdUsLATs6QlSnAg268nrzbYq5BKyKjc6I6uY0aeF:yYNdyoXAXVaO3muP9l8AgJmzkq5oyKPU
Static task
static1
Behavioral task
behavioral1
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knuelc78.top
moreag07.top
-
payload_url
http://sarafc10.top/download.php?file=lv.exe
Targets
-
-
Target
6f803ef93ff43f7ca1c58a4da0a93e0f
-
Size
5.2MB
-
MD5
6f803ef93ff43f7ca1c58a4da0a93e0f
-
SHA1
edfcb91cfc368a096541393cbea32fc42954336b
-
SHA256
bda2b27d917dc919d2df7f2768a5d20f4f554e6f0eeb687f5ac45b53aecbb2f3
-
SHA512
9a6b30821cb36ed1634bd9f962bf4c71a61ccff8ec67c317dab3655104faad9f62ec869a4a1c9032f218308d77e0b26c1a0f08c777109faad17e0037ef684235
-
SSDEEP
98304:yYgYhpOqywS4gcAXVaOjV3XdUsLATs6QlSnAg268nrzbYq5BKyKjc6I6uY0aeF:yYNdyoXAXVaO3muP9l8AgJmzkq5oyKPU
-
CryptBot payload
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
setup_installer.exe
-
Size
5.2MB
-
MD5
71e2cf4709767eab8e0e6dcd8f19d37c
-
SHA1
0641acedc06c13a17d94968e3237c4d9533fc0b9
-
SHA256
077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd
-
SHA512
686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675
-
SSDEEP
98304:xwCvLUBsg6N9b/s7w39Zl+M0pVlFT77ekNZarbw8lsI4ZhQZX5ksdE9pvccJ2o3:xNLUCgM5k0vlSl8OZ6sI4ZipbEpvc02a
-
CryptBot payload
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1