Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-08-25_b57956f6d4ccf57e7c4e327020a456b9_poet-rat_snatch

  • Size

    14.0MB

  • Sample

    240825-1h7tmayapq

  • MD5

    b57956f6d4ccf57e7c4e327020a456b9

  • SHA1

    e804f692483945d0dc4604a4a1220902d7c55f6b

  • SHA256

    5be6f36014d4b72e8cc036fafe84e49e6d107e84904c87c5f9b5a2faceb1bf9e

  • SHA512

    2c15e0c958020e7e0678262db5a235657559d9ee72ae29aac7660b8759faccad622919e97f1bde4bf4a486394d1ed32484454b046dc06a58029345cda4071929

  • SSDEEP

    98304:NSdnz5ExC+1YVG2JNLDn/wDnEhJf0RTFh1veMcFJqEFnIV0PvrIIKJu4ahDXFNkW:+z5ExCsgcEXhbIV2v14AFmA/NGaX

Malware Config

Targets

    • Target

      2024-08-25_b57956f6d4ccf57e7c4e327020a456b9_poet-rat_snatch

    • Size

      14.0MB

    • MD5

      b57956f6d4ccf57e7c4e327020a456b9

    • SHA1

      e804f692483945d0dc4604a4a1220902d7c55f6b

    • SHA256

      5be6f36014d4b72e8cc036fafe84e49e6d107e84904c87c5f9b5a2faceb1bf9e

    • SHA512

      2c15e0c958020e7e0678262db5a235657559d9ee72ae29aac7660b8759faccad622919e97f1bde4bf4a486394d1ed32484454b046dc06a58029345cda4071929

    • SSDEEP

      98304:NSdnz5ExC+1YVG2JNLDn/wDnEhJf0RTFh1veMcFJqEFnIV0PvrIIKJu4ahDXFNkW:+z5ExCsgcEXhbIV2v14AFmA/NGaX

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Looks for VirtualBox drivers on disk

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks for VMWare drivers on disk

    • Modifies Windows Firewall

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks