Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-08-25_1efbe434510bf569394240170f3b2870_poet-rat_snatch

  • Size

    14.0MB

  • Sample

    240825-193c8azfpl

  • MD5

    1efbe434510bf569394240170f3b2870

  • SHA1

    f5169fff34809dc7c9438cabe91b8940c70f7b45

  • SHA256

    8df56196a7e447f592195adc3732a0fc709bd2b4c5b26ef7ea38175803ae3a12

  • SHA512

    e52539c324ef42b6e522c5f872be66c0114b0382b6de613b9dfbfcf58f996347cb9c9b3071a2aecc1ede4a79d86fd9698f5047ad1ab2a0aefb59291b36e5e8e5

  • SSDEEP

    98304:jFzji0rxnPrr9G2VsLAfmQ0VEjp90RTFh1vkMcFJqEFnIV0PvrIIKJu4ahDXFNkW:Be0rxnAemmdRbIV2v14AFmA/NGaX

Malware Config

Targets

    • Target

      2024-08-25_1efbe434510bf569394240170f3b2870_poet-rat_snatch

    • Size

      14.0MB

    • MD5

      1efbe434510bf569394240170f3b2870

    • SHA1

      f5169fff34809dc7c9438cabe91b8940c70f7b45

    • SHA256

      8df56196a7e447f592195adc3732a0fc709bd2b4c5b26ef7ea38175803ae3a12

    • SHA512

      e52539c324ef42b6e522c5f872be66c0114b0382b6de613b9dfbfcf58f996347cb9c9b3071a2aecc1ede4a79d86fd9698f5047ad1ab2a0aefb59291b36e5e8e5

    • SSDEEP

      98304:jFzji0rxnPrr9G2VsLAfmQ0VEjp90RTFh1vkMcFJqEFnIV0PvrIIKJu4ahDXFNkW:Be0rxnAemmdRbIV2v14AFmA/NGaX

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Looks for VirtualBox drivers on disk

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks for VMWare drivers on disk

    • Modifies Windows Firewall

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks