Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    d1cd7f738f33f05327df5ffee2c7580190ef27c0bcac16acd5170f3ceedabcfd

  • Size

    1.8MB

  • Sample

    240506-bw7y4scg51

  • MD5

    4fa386b5aad76ef31e715f809be74fd2

  • SHA1

    9c4f00ca9d031b1ef97c88456d3e6c06e15f4520

  • SHA256

    d1cd7f738f33f05327df5ffee2c7580190ef27c0bcac16acd5170f3ceedabcfd

  • SHA512

    bb87ed3706a972f8831ca627c2eee33241c4b7595c468d96b2ebeebc596c8225237caba786e08b5b1b714290c790370a9a86809e8a3711bdb34642ec9802876c

  • SSDEEP

    49152:x2CbyEnORVDGlC4TIJyXXjwLrhSDMbo1AFeKK6yJl98gMO:tbyEnSiC4cJyHjwL8eo1HEyZ3

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain
1
a091ec0a6e22276a96a99c1d34ef679c

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Targets

    • Target

      d1cd7f738f33f05327df5ffee2c7580190ef27c0bcac16acd5170f3ceedabcfd

    • Size

      1.8MB

    • MD5

      4fa386b5aad76ef31e715f809be74fd2

    • SHA1

      9c4f00ca9d031b1ef97c88456d3e6c06e15f4520

    • SHA256

      d1cd7f738f33f05327df5ffee2c7580190ef27c0bcac16acd5170f3ceedabcfd

    • SHA512

      bb87ed3706a972f8831ca627c2eee33241c4b7595c468d96b2ebeebc596c8225237caba786e08b5b1b714290c790370a9a86809e8a3711bdb34642ec9802876c

    • SSDEEP

      49152:x2CbyEnORVDGlC4TIJyXXjwLrhSDMbo1AFeKK6yJl98gMO:tbyEnSiC4cJyHjwL8eo1HEyZ3

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect ZGRat V1

    • Modifies firewall policy service

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Stealc

      Stealc is an infostealer written in C++.

    • UAC bypass

    • Windows security bypass

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.