Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    hamachi.msi

  • Size

    13.7MB

  • Sample

    240806-p2djcatcqh

  • MD5

    909db4061c32f798e94d746717782444

  • SHA1

    10f5ffff17d2dd4476686a941a7bcc5f9b83b1b8

  • SHA256

    6ee98db32852a2ff31a969d918bb7c730950bb15f24ea1baf996697cebc8b9fa

  • SHA512

    44e7f97b27aef2e4cb62a6a0ebab5033b99e1ec940f231eda416f3b68d83df81d10950a8ced2ca528024adecd1dea7e1d4427e78b111edbc0124d7ffd6c1232d

  • SSDEEP

    196608:cp/8gF8Li2aauOgsgJ9RSfD3G43O+WFoy1jNDVxJBQHhIO4E46uVwOXsHoHybhLf:O/382agT9RK73O+kN3JSHuy46inqUMC

Malware Config

Targets

    • Target

      hamachi.msi

    • Size

      13.7MB

    • MD5

      909db4061c32f798e94d746717782444

    • SHA1

      10f5ffff17d2dd4476686a941a7bcc5f9b83b1b8

    • SHA256

      6ee98db32852a2ff31a969d918bb7c730950bb15f24ea1baf996697cebc8b9fa

    • SHA512

      44e7f97b27aef2e4cb62a6a0ebab5033b99e1ec940f231eda416f3b68d83df81d10950a8ced2ca528024adecd1dea7e1d4427e78b111edbc0124d7ffd6c1232d

    • SSDEEP

      196608:cp/8gF8Li2aauOgsgJ9RSfD3G43O+WFoy1jNDVxJBQHhIO4E46uVwOXsHoHybhLf:O/382agT9RK73O+kN3JSHuy46inqUMC

    • Drops file in Drivers directory

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks