Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    90125421267c6f2a55fb1566eac89528

  • Size

    1.1MB

  • Sample

    240204-y62amsaac6

  • MD5

    90125421267c6f2a55fb1566eac89528

  • SHA1

    eb56f971b495461dce763a4680b96c4e07d5a1b5

  • SHA256

    1e9b61bacadec88ed81039e5551de06d39f558694e5756bbe7aa92d46ba488a5

  • SHA512

    e36d7cccf5c4e7aa134a922e7d5b735cc4ab5094dd4cdb2a4407c33934459871b412c7f8d4c527d75f04535ca592fd1a354a718925ef7a21a6a28e2b02d58d6f

  • SSDEEP

    24576:KCEPLqs02vS7YlgdGNrY6JtfcDc8a24C2xSeq9Ra+4:KCCx0XIUUmRN

Malware Config

Targets

    • Target

      90125421267c6f2a55fb1566eac89528

    • Size

      1.1MB

    • MD5

      90125421267c6f2a55fb1566eac89528

    • SHA1

      eb56f971b495461dce763a4680b96c4e07d5a1b5

    • SHA256

      1e9b61bacadec88ed81039e5551de06d39f558694e5756bbe7aa92d46ba488a5

    • SHA512

      e36d7cccf5c4e7aa134a922e7d5b735cc4ab5094dd4cdb2a4407c33934459871b412c7f8d4c527d75f04535ca592fd1a354a718925ef7a21a6a28e2b02d58d6f

    • SSDEEP

      24576:KCEPLqs02vS7YlgdGNrY6JtfcDc8a24C2xSeq9Ra+4:KCCx0XIUUmRN

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks