Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    3D black.png

  • Size

    2.9MB

  • Sample

    240806-hej92swdke

  • MD5

    3274147893f0d7107549d5e749a8a4e3

  • SHA1

    0e76d9b3affa982e485dd2bea76e1d43f2294077

  • SHA256

    687926097cbf2bf7780525d61f350db22837059cfd9cbb3caf64d10d11cb6ff1

  • SHA512

    832669e20fadb6ff07df9e9e2dae0bb64aa325a07b3a0da95d36f4ea9dec452f42919d00c53c7db2f88ebd8b53e89584c8b2caa7dec9c451f6f43280ed554f92

  • SSDEEP

    49152:ZkFAVYhQ7Yxteg7NNSbxfQ5QOD/zF2rpEFjsSqCe+GI5MSLRj9+ktGVZV/ZRUf1E:ZkmVYhQ7Yxteg7NNSbxfQ5QOD/zF2rpL

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

rat1

C2

xfreddy2751.duckdns.org:6606

xfreddy2751.duckdns.org:7707

xfreddy2751.duckdns.org:8808

darkstorm275991.ddns.net:6606

darkstorm275991.ddns.net:7707

darkstorm275991.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    License.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      3D black.png

    • Size

      2.9MB

    • MD5

      3274147893f0d7107549d5e749a8a4e3

    • SHA1

      0e76d9b3affa982e485dd2bea76e1d43f2294077

    • SHA256

      687926097cbf2bf7780525d61f350db22837059cfd9cbb3caf64d10d11cb6ff1

    • SHA512

      832669e20fadb6ff07df9e9e2dae0bb64aa325a07b3a0da95d36f4ea9dec452f42919d00c53c7db2f88ebd8b53e89584c8b2caa7dec9c451f6f43280ed554f92

    • SSDEEP

      49152:ZkFAVYhQ7Yxteg7NNSbxfQ5QOD/zF2rpEFjsSqCe+GI5MSLRj9+ktGVZV/ZRUf1E:ZkmVYhQ7Yxteg7NNSbxfQ5QOD/zF2rpL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Modifies visiblity of hidden/system files in Explorer

    • AgentTesla payload

    • Async RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks