Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    3b8b335babae9d4a73824efe54aa2148.exe

  • Size

    1.2MB

  • Sample

    240416-tkrrvsed35

  • MD5

    3b8b335babae9d4a73824efe54aa2148

  • SHA1

    ebb36ea7e8702f50272952071c18f362b0888003

  • SHA256

    4e6333e4c4cb032d90a01f0499d63346da93f702ef1bc8aa6a0b0a8cad912354

  • SHA512

    d110697dcfa249f71fe0b5097d83351285c3f4440d82aa39080d016e0202572b229612a2778aac34b26791aadfe0ce7c89b663ee2d2a83ef43bb7cf0c9fac83e

  • SSDEEP

    24576:NR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:TJaDKf4p4UD1v

Malware Config

Targets

    • Target

      3b8b335babae9d4a73824efe54aa2148.exe

    • Size

      1.2MB

    • MD5

      3b8b335babae9d4a73824efe54aa2148

    • SHA1

      ebb36ea7e8702f50272952071c18f362b0888003

    • SHA256

      4e6333e4c4cb032d90a01f0499d63346da93f702ef1bc8aa6a0b0a8cad912354

    • SHA512

      d110697dcfa249f71fe0b5097d83351285c3f4440d82aa39080d016e0202572b229612a2778aac34b26791aadfe0ce7c89b663ee2d2a83ef43bb7cf0c9fac83e

    • SSDEEP

      24576:NR28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:TJaDKf4p4UD1v

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks