Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ca15de24c3fa60e90b343b7376808d1c
-
Size
4.2MB
-
Sample
240315-bc6a6scf6v
-
MD5
ca15de24c3fa60e90b343b7376808d1c
-
SHA1
e8004170f53ff94665f2ff97a97fb7a78d3a0a74
-
SHA256
f7a805b251505433e34517da69eccb73955a424bb9d9061309091cf52c07a349
-
SHA512
8eb9e8f9ea7087aa5cbfb5babd60a5abf31d96d5b245a846420c218a8f40527ed0b1a541a777e23b79170c52db43ad1ba336a399157b2218c4d1784eea1c76d3
-
SSDEEP
98304:yIfOSOUrxz7b98tUs3nKN/r/i3AF6mwQApnC1VUc21ZBNcPflHM:yIfPOCxzHqB3t5NToVULBNc3a
Static task
static1
Behavioral task
behavioral1
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
cryptbot
knudqw18.top
morzku01.top
-
payload_url
http://saryek01.top/download.php?file=lv.exe
Targets
-
-
Target
ca15de24c3fa60e90b343b7376808d1c
-
Size
4.2MB
-
MD5
ca15de24c3fa60e90b343b7376808d1c
-
SHA1
e8004170f53ff94665f2ff97a97fb7a78d3a0a74
-
SHA256
f7a805b251505433e34517da69eccb73955a424bb9d9061309091cf52c07a349
-
SHA512
8eb9e8f9ea7087aa5cbfb5babd60a5abf31d96d5b245a846420c218a8f40527ed0b1a541a777e23b79170c52db43ad1ba336a399157b2218c4d1784eea1c76d3
-
SSDEEP
98304:yIfOSOUrxz7b98tUs3nKN/r/i3AF6mwQApnC1VUc21ZBNcPflHM:yIfPOCxzHqB3t5NToVULBNc3a
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
setup_installer.exe
-
Size
4.2MB
-
MD5
baf330c66dc494f59980816acd04c9da
-
SHA1
7f394f6664318aae1e8b351ee8f6952957bd957c
-
SHA256
8ba4bd3b729779ced975109d4c7c427baf7ab6b011bf9ac1c0ea0419c102bb60
-
SHA512
1dccc6560b5b5a2a921501a3fe115fa7338bc7d354bce2292f2326d02fa7fcbf85c01d6143d1d857920f3573de4d8fe375fc5afd4bdefcd2c26224109c0d667e
-
SSDEEP
98304:xcCvLUBsgrye6P8kqRj0FZp4zwkVyEXnXOb+6V:xBLUCgry5P8zRwFZez7BubP
-
CryptBot payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1