Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    374e8098b96f7f4f611fff1dc629cff24d96866d4b83f9f61f184a389cfdf43c

  • Size

    419KB

  • Sample

    240505-hlmczsac8v

  • MD5

    849edce335796f42d3b682bf32f81129

  • SHA1

    fc137bfd29f2f42c4d0cbfe306eb5cdac12c5d13

  • SHA256

    374e8098b96f7f4f611fff1dc629cff24d96866d4b83f9f61f184a389cfdf43c

  • SHA512

    7300d59785abe610e4f0b9546865f16aeca3078978dc8286960fe9a6655302a0d394e9f12ed8e52ea3ba38b24878897722a570444c39f721c5de7ea2b3946913

  • SSDEEP

    6144:l48TpWQ71lhlPxITIhFVyEWGNCIldSGBlcIs0U7oyGFXC6NDv:l48TpWEHiYXyEhNldSFIs0U7FG0+Dv

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      374e8098b96f7f4f611fff1dc629cff24d96866d4b83f9f61f184a389cfdf43c

    • Size

      419KB

    • MD5

      849edce335796f42d3b682bf32f81129

    • SHA1

      fc137bfd29f2f42c4d0cbfe306eb5cdac12c5d13

    • SHA256

      374e8098b96f7f4f611fff1dc629cff24d96866d4b83f9f61f184a389cfdf43c

    • SHA512

      7300d59785abe610e4f0b9546865f16aeca3078978dc8286960fe9a6655302a0d394e9f12ed8e52ea3ba38b24878897722a570444c39f721c5de7ea2b3946913

    • SSDEEP

      6144:l48TpWQ71lhlPxITIhFVyEWGNCIldSGBlcIs0U7oyGFXC6NDv:l48TpWEHiYXyEhNldSFIs0U7FG0+Dv

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks