Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Built.exe

  • Size

    7.3MB

  • Sample

    240805-wvj6waxfnd

  • MD5

    ac998a0b377ffcd7bf1518c73b301c65

  • SHA1

    314e90ef2e2dbfb9dfe1e1b91fb25c487990ef27

  • SHA256

    c2960ab4b9933e0d1fa24de7eec6e38551892705d327efe65c9a8fe2cb4a29d7

  • SHA512

    6ee04619d89ef2df11cbbdc87336be04464e987014397b7b26f816f5b4c9802cf3c9087dd6e460dfad124ea8a0a369cc50f091f304ef9de122e4ff1e865d570d

  • SSDEEP

    196608:270R5Q0FeAeeNTfm/pf+xk4dWRatrbWOjgKR:ZBcMy/pWu4kRatrbvMKR

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.3MB

    • MD5

      ac998a0b377ffcd7bf1518c73b301c65

    • SHA1

      314e90ef2e2dbfb9dfe1e1b91fb25c487990ef27

    • SHA256

      c2960ab4b9933e0d1fa24de7eec6e38551892705d327efe65c9a8fe2cb4a29d7

    • SHA512

      6ee04619d89ef2df11cbbdc87336be04464e987014397b7b26f816f5b4c9802cf3c9087dd6e460dfad124ea8a0a369cc50f091f304ef9de122e4ff1e865d570d

    • SSDEEP

      196608:270R5Q0FeAeeNTfm/pf+xk4dWRatrbWOjgKR:ZBcMy/pWu4kRatrbvMKR

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks