Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    mempool-trading-bot-main.zip

  • Size

    2.1MB

  • Sample

    240408-my22esfd79

  • MD5

    360cc7a2686896a72540e686995c0705

  • SHA1

    aa067184beed32055a550a247281d9cecedbaece

  • SHA256

    b1b5d3a4838b08e5ef21bcf27d7a8b94e2e50bb81ba4705162e73c05fc5706c0

  • SHA512

    314dc8f1b1fb9dbd99adeb27a0782426fcda6755cb2a6aeb02a6d919ad255807d5531224e04909df5dca7228b6337db8b45fac69c13574fcf82bbc930e4350b6

  • SSDEEP

    49152:kztur7/YpP/HFMWQPdqTzN2FFF1opi0ax+qK4tmek3+sJ5V6nn:kzt4/kvFMXkTx2FFF1UblzfDJ0n

Malware Config

Targets

    • Target

      mempool-trading-bot-main/test.py

    • Size

      1B

    • MD5

      68b329da9893e34099c7d8ad5cb9c940

    • SHA1

      adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

    • SHA256

      01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

    • SHA512

      be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks