Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-05-28_03d0de4cda4efd31f762aadf487b7aec_hacktools_icedid_mimikatz

  • Size

    9.0MB

  • Sample

    240528-mhcrlafe5x

  • MD5

    03d0de4cda4efd31f762aadf487b7aec

  • SHA1

    aeb5d2ef2ba2ba6a24ece954442d236caaabf872

  • SHA256

    6f1e9522dd1dee1eb3bcd140f3d4cd61ab3cf7bfd8fdaabb8d1dec4834be3713

  • SHA512

    a40209a7f055317ece2ce295bd0dcc2b8c186f131f37e73fb93a02e4a87e733b9a82cc3b2c43968fa7e3d04ef7dc50e4d6c38262b20cd9c9c018186c1f1683c5

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Targets

    • Target

      2024-05-28_03d0de4cda4efd31f762aadf487b7aec_hacktools_icedid_mimikatz

    • Size

      9.0MB

    • MD5

      03d0de4cda4efd31f762aadf487b7aec

    • SHA1

      aeb5d2ef2ba2ba6a24ece954442d236caaabf872

    • SHA256

      6f1e9522dd1dee1eb3bcd140f3d4cd61ab3cf7bfd8fdaabb8d1dec4834be3713

    • SHA512

      a40209a7f055317ece2ce295bd0dcc2b8c186f131f37e73fb93a02e4a87e733b9a82cc3b2c43968fa7e3d04ef7dc50e4d6c38262b20cd9c9c018186c1f1683c5

    • SSDEEP

      196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (27715) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.