Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10OTP Bypass...p-diff
ubuntu-18.04-amd64
1OTP Bypass...p-diff
debian-9-armhf
1OTP Bypass...p-diff
debian-9-mips
1OTP Bypass...p-diff
debian-9-mipsel
1OTP Bypass...p-grep
ubuntu-18.04-amd64
1OTP Bypass...p-grep
debian-9-armhf
1OTP Bypass...p-grep
debian-9-mips
1OTP Bypass...p-grep
debian-9-mipsel
1OTP Bypass...in.exe
windows7-x64
7OTP Bypass...in.exe
windows10-2004-x64
7OTP Bypass...up.exe
windows7-x64
7OTP Bypass...up.exe
windows10-2004-x64
7)-(��.pyc
windows7-x64
)-(��.pyc
windows10-2004-x64
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 18:51
Behavioral task
behavioral1
Sample
OTP Bypasser v1/bin/pip-diff
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
OTP Bypasser v1/bin/pip-grep
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral6
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral7
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral8
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral9
Sample
OTP Bypasser v1/login.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
OTP Bypasser v1/login.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
OTP Bypasser v1/setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
OTP Bypasser v1/setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
)-(��.pyc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
)-(��.pyc
Resource
win10v2004-20231215-en
General
-
Target
OTP Bypasser v1/login.exe
-
Size
48.9MB
-
MD5
3f021a743dfffaf6339507e764e11852
-
SHA1
4a95d0a84fb633a715ff0db83c9b56db5a592a70
-
SHA256
faeb443e13fda78ba26820c2be59d32ee1d7d59c0a9ead6978d2e113bcd25461
-
SHA512
541eb6d6a8552947c552a20072292ce8c9c106b91b3e0ad6062b47a444d53e4b77ec4f9fbc173f32b3d5da88a5b0a7aaa4a25cd2ddb8f61c5ec816e8d5ddc9aa
-
SSDEEP
393216:C94n6eQnJVgetJBRrnlPSa7KvMwGs4zGbdd7BRo:C9mQtrnlxmUNcL7v
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2912 login.exe -
resource yara_rule behavioral9/files/0x000500000001a417-101.dat upx behavioral9/memory/2912-103-0x000007FEF5E30000-0x000007FEF641A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2912 2212 login.exe 28 PID 2212 wrote to memory of 2912 2212 login.exe 28 PID 2212 wrote to memory of 2912 2212 login.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\login.exe"C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\login.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\login.exe"C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\login.exe"2⤵
- Loads dropped DLL
PID:2912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD593fbda093dcc8b7ce3bca1411757d7d8
SHA125c5035659aeb647fb7c5d9b82dd49dd685504c2
SHA256233f4666110f88447382dc4726bd85161e749c6a0f77145e59018d24fd0e0eb5
SHA512f4d7729897449ca2147cb92fc5bd4130279d4008c6c1a77f37110aa85c5bcf010995858a828e22a4633db8eda40586c53f504874b6205040ad5cb1df130e9f82