Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Built.exe

  • Size

    7.4MB

  • Sample

    240603-h7xe3shb45

  • MD5

    e6b9012de1c43848ae5942a45f90edac

  • SHA1

    566f05b4aad2b034eaeced1545358c0173716134

  • SHA256

    31c62617443f43f9f30a29ff09256ba39c333c93cd4a0c89f33b7b08e9693b01

  • SHA512

    64640537bfbe4d593d3b50a96c87bdfb1181e35b675f6dbcf6589d1bdd3efb393d7f5af2c26b7d3af906177ed64404acc530221e7866364fe55b1c0c00297bb7

  • SSDEEP

    196608:5rkEP9VPyaurErvI9pWjgfPvzm6gsFEB4Au1:9lEaurEUWjC3zDb84Au1

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.4MB

    • MD5

      e6b9012de1c43848ae5942a45f90edac

    • SHA1

      566f05b4aad2b034eaeced1545358c0173716134

    • SHA256

      31c62617443f43f9f30a29ff09256ba39c333c93cd4a0c89f33b7b08e9693b01

    • SHA512

      64640537bfbe4d593d3b50a96c87bdfb1181e35b675f6dbcf6589d1bdd3efb393d7f5af2c26b7d3af906177ed64404acc530221e7866364fe55b1c0c00297bb7

    • SSDEEP

      196608:5rkEP9VPyaurErvI9pWjgfPvzm6gsFEB4Au1:9lEaurEUWjC3zDb84Au1

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks