Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Launcher_v.1.82.dmg
-
Size
3.8MB
-
Sample
240624-wfj8bsyakm
-
MD5
97a30830c052c5151a49f880ce9548ac
-
SHA1
ea02cdf98aa9aeb6ab8e0396493c13c08a4eb3bb
-
SHA256
14f30b9c005f28caca6798e9b430a39595c60a245c38dbc253c8408495e0adb5
-
SHA512
cf7e0e5c772f3176c25c1f3428e824e7ef8792cfb8a421a9ddfd67c33da769da1b368778bb763b77f01765ccdca5fb1ceaeab9c8432fd9f1101cbc3941587acb
-
SSDEEP
24576:9KxZfFNDY0gyrDgnagt7gwGUhgb9NDYC5rEBSQ9RJzWET+bQWVx7EYzBf7vAtlf0:9ufFvDPU7zG
Static task
static1
Behavioral task
behavioral1
Sample
Launcher_v.1.82.dmg
Resource
macos-20240611-en
Malware Config
Targets
-
-
Target
Launcher_v.1.82.dmg
-
Size
3.8MB
-
MD5
97a30830c052c5151a49f880ce9548ac
-
SHA1
ea02cdf98aa9aeb6ab8e0396493c13c08a4eb3bb
-
SHA256
14f30b9c005f28caca6798e9b430a39595c60a245c38dbc253c8408495e0adb5
-
SHA512
cf7e0e5c772f3176c25c1f3428e824e7ef8792cfb8a421a9ddfd67c33da769da1b368778bb763b77f01765ccdca5fb1ceaeab9c8432fd9f1101cbc3941587acb
-
SSDEEP
24576:9KxZfFNDY0gyrDgnagt7gwGUhgb9NDYC5rEBSQ9RJzWET+bQWVx7EYzBf7vAtlf0:9ufFvDPU7zG
-
Queries the macOS version information.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
-
System Checks
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox.
-
-
-
Target
Setup/Setup
-
Size
817KB
-
MD5
3d0fd2cceda9ce0323cbfee544dbb28e
-
SHA1
c466c8d79fb89a0e60ab35056224f9bdc0b13f0e
-
SHA256
1cd69417715dbc3678f1dbe48412feee1a0e180558025b7969f5895b4518b0c6
-
SHA512
95b4cc4358f2afb18c48cce5ede259bcce7d50ef620ae190c123c11b21238a48137684fdc07a5fc0faa609679a1cdd6665ae6a85f8aeb5bd743c14fd1c62c92f
-
SSDEEP
24576:Sxlz+I27UA2hI0OgkRG/iwkGjSG4Ol2vYKA:SxV+I2A1OgkRG/iwkGjSG4Ol2vYX
-
Queries the macOS version information.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
-
System Checks
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox.
-