Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    zerorobloxmain.zip

  • Size

    8.2MB

  • Sample

    240819-zmdwnsvekh

  • MD5

    046cde54d44485f022792447c2fb06cc

  • SHA1

    3a1d88bd5ca223b0260ead31e2184c07059f56dd

  • SHA256

    8a0ebabd9ad0d5314b1a04c30d3fc972ed5a8bb8cf5c8e045e497373ba6f066c

  • SHA512

    108068a048df338c8129a449796f63c0e4b1cc5a2df82343afb12cefa1aaf17e9a32819210d2ecf49b4eb7d3aecf9f8e9baee6d0db18451a769e62c230cce63b

  • SSDEEP

    196608:2pMJ9t7od/1Hj3LCryBfqDh3kRf7/RX/fw+Pvmyydrl:2pMJgdN2yYDh05LRvo+PvnCZ

Malware Config

Targets

    • Target

      zeroroblox-main/Build-GUI.exe

    • Size

      8.3MB

    • MD5

      d323bb28562b2fdc19900b81952d6c8e

    • SHA1

      8674ba3aa877b48bcbf29f8c1d6397e791274e15

    • SHA256

      a8ed69495497337c77cc6512d3a0975960fcc2466420bbe57c819c3f15d5565e

    • SHA512

      2d5311ca5aacd7ae789d9fc2a7f7ce1d4de9b2f779848bf2d741dca210b5d456246201c172ce6042dc192117b9c36a7558209c2919289e2c7c0f905e7010fe51

    • SSDEEP

      196608:EFZpb7KX/BdvZ/eNWPfm/pf+xZudXRR7h5CrfOMWZQ:AZYXpIWm/pWvuVRFPCrf/s

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      zeroroblox-main/webhook.py

    • Size

      1B

    • MD5

      68b329da9893e34099c7d8ad5cb9c940

    • SHA1

      adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

    • SHA256

      01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

    • SHA512

      be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks