Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
PO_No_0013011100.7z
-
Size
508KB
-
Sample
240220-r6n7raad88
-
MD5
801452455e45c22c34b603ceeb0890e3
-
SHA1
12bee7c4f0914d5698537c10a3434e294e3f5e57
-
SHA256
0c30ec708892a590444c93edddae43cdb45911940d06bdc65931e75c2583700f
-
SHA512
019757d7cfd428cde4a1cd27098f19dd28668a582103745e729d14bb6c6f4dada54be0d5b62c8917ff20d93f76efdaebee4c3246e408d175c58894975a1ab383
-
SSDEEP
12288:k/6nrjh5wkpw/NDsk69RAtbc05CyIxQFk00YC59:k/6nrjhekpw/W7MbcpyI2Fk359
Static task
static1
Behavioral task
behavioral1
Sample
PO_No_0013011100.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO_No_0013011100.exe
Resource
win10v2004-20240220-en
Malware Config
Extracted
remcos
RemoteHost
fsts.duckdns.org:1985
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
yiuhjg
-
mouse_option
false
-
mutex
Rmc-ZUDCLG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
PO_No_0013011100.exe
-
Size
1.3MB
-
MD5
b303f612505ca4e0f716f5c46ea4648d
-
SHA1
d40300c34cb807ae7f40c9597c0ade63bb9d3921
-
SHA256
d0cb6fe15a7104c380fdae815eca883d2167bab46d2a243c67f13200ff30ff75
-
SHA512
0a2044e4dbe58a1378eac7316d521d014574ed570663305a71386e72d4f58878a10ec63006f4dc4db74ac4acf866086122c77179ca47b48318491ac7421677d7
-
SSDEEP
24576:kH+bZn4eJDePreMta+dBZPGBAvPZsRDl4D0:kH7eJiPrVBZPGBJO
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1