Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
CzSOSINT.exe
-
Size
297KB
-
Sample
240425-2lbq2aga66
-
MD5
311c6835775d900f12ece1d138aee2a6
-
SHA1
95ea06961562ddfa77f645be03f95d08d1cdb2e0
-
SHA256
31f0e68a0fb8a6e1714ade7379d486d56aa1421d2f22ff3d632c1fe24f59457a
-
SHA512
19cc40219e209fc878ea2beb5cb81917cd3bf43684d9c1d42643581c38b5db393ae8c2362d167521002e466a80fe24b08163aefda5aa7d266b4731f5c985d500
-
SSDEEP
6144:9eQCIpHePBK7UOYz1mhJCtWY9XcNfPHDpu74NpgtcZRg/+wPO:0ae5mYzcLC0YuF8kHX/g/
Static task
static1
Behavioral task
behavioral1
Sample
CzSOSINT.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
CzSOSINT.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
quasar
3.1.5
RSlaveReel
147.185.221.19:33587
$Sxr-PODin6zbdvLuVkqKla
-
encryption_key
myaDwGp04jmlN7Zrz509
-
install_name
WindowsDllRunHost.exe
-
log_directory
Update Logs
-
reconnect_delay
3000
-
startup_key
WindowsBIOSUpdx64
-
subdirectory
orbitpaid
Targets
-
-
Target
CzSOSINT.exe
-
Size
297KB
-
MD5
311c6835775d900f12ece1d138aee2a6
-
SHA1
95ea06961562ddfa77f645be03f95d08d1cdb2e0
-
SHA256
31f0e68a0fb8a6e1714ade7379d486d56aa1421d2f22ff3d632c1fe24f59457a
-
SHA512
19cc40219e209fc878ea2beb5cb81917cd3bf43684d9c1d42643581c38b5db393ae8c2362d167521002e466a80fe24b08163aefda5aa7d266b4731f5c985d500
-
SSDEEP
6144:9eQCIpHePBK7UOYz1mhJCtWY9XcNfPHDpu74NpgtcZRg/+wPO:0ae5mYzcLC0YuF8kHX/g/
Score10/10-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-