Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975
-
Size
313KB
-
Sample
240818-xqftbssdnq
-
MD5
2aeeb429e9290526b96bf4b58b2411ad
-
SHA1
4b4527fbd51763b51d4acebcf157ba3bd5082ce1
-
SHA256
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975
-
SHA512
8de691347446377838638dd97ab36ad4fbec672be0158451778901bf4ee62b6002f18fe06c7365b952d0650308eb78dadd9d338c91c67b181041807004c242cc
-
SSDEEP
6144:48XN6W8mmHPtppXPSi9b4qt3GPMVRSbfWraqe9s:FN6qatppXP1t3jcWraq
Behavioral task
behavioral1
Sample
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6110313252:AAE6fFOzBefHnbenT-1DwxI9EBeZQTxbYGk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.1
119.59.98.116:7812
JBMeOx2rIgGrdV0y
-
Install_directory
%AppData%
-
install_file
Windows Defender security.exe
-
telegram
https://api.telegram.org/bot6110313252:AAE6fFOzBefHnbenT-1DwxI9EBeZQTxbYGk/sendMessage?chat_id=6291749148
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
119.59.98.116:7812
WindowsDefendersecurityService
-
delay
1
-
install
true
-
install_file
Windows Defender Security Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975
-
Size
313KB
-
MD5
2aeeb429e9290526b96bf4b58b2411ad
-
SHA1
4b4527fbd51763b51d4acebcf157ba3bd5082ce1
-
SHA256
d242df7f2b38186e3ff903b28119c09883df033ba2519e9b5f19eb0652f78975
-
SHA512
8de691347446377838638dd97ab36ad4fbec672be0158451778901bf4ee62b6002f18fe06c7365b952d0650308eb78dadd9d338c91c67b181041807004c242cc
-
SSDEEP
6144:48XN6W8mmHPtppXPSi9b4qt3GPMVRSbfWraqe9s:FN6qatppXP1t3jcWraq
-
Detect Xworm Payload
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1