Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Random.exe

  • Size

    2.5MB

  • Sample

    240205-gp93sacah2

  • MD5

    af49996cdbe1e9d9ca66458a06725a94

  • SHA1

    a6bd1c6a78483ba1b7ee3cb9670568684039501d

  • SHA256

    a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73

  • SHA512

    c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b

  • SSDEEP

    49152:ltNX6YES/M1lVuRk+W2gQS4v51nzzz9gt9dvZO:l3R5+o7XmvdvA

Malware Config

Targets

    • Target

      Random.exe

    • Size

      2.5MB

    • MD5

      af49996cdbe1e9d9ca66458a06725a94

    • SHA1

      a6bd1c6a78483ba1b7ee3cb9670568684039501d

    • SHA256

      a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73

    • SHA512

      c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b

    • SSDEEP

      49152:ltNX6YES/M1lVuRk+W2gQS4v51nzzz9gt9dvZO:l3R5+o7XmvdvA

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • UAC bypass

    • Windows security bypass

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies boot configuration data using bcdedit

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks