Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-08-25_01055d7c7882cec1c91cb53363b8c81c_poet-rat_snatch

  • Size

    14.0MB

  • Sample

    240825-ey8vzawcqr

  • MD5

    01055d7c7882cec1c91cb53363b8c81c

  • SHA1

    48b85fd5da48807b0c9a64c1026b4aeaf5543bca

  • SHA256

    fc4f68222883438cae50486c76be9f770882b49785e1ef0c7ebd965c6b252e75

  • SHA512

    2be8432fbd30a127e8e974bed6848ca454f1d0bb7b399caae823ec1dfa94d01930a3143b00df21297a73c45d0d3f588fed835697d8e560a576b05ec2bd93469c

  • SSDEEP

    196608:u1chh2Ys+B+nrWqdgOgHIxPGjGs92GNSkjGqIjHyn:uAhzn+nrWogOgeujGA2nkjMjH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/antivirusbypass.ps1

Targets

    • Target

      2024-08-25_01055d7c7882cec1c91cb53363b8c81c_poet-rat_snatch

    • Size

      14.0MB

    • MD5

      01055d7c7882cec1c91cb53363b8c81c

    • SHA1

      48b85fd5da48807b0c9a64c1026b4aeaf5543bca

    • SHA256

      fc4f68222883438cae50486c76be9f770882b49785e1ef0c7ebd965c6b252e75

    • SHA512

      2be8432fbd30a127e8e974bed6848ca454f1d0bb7b399caae823ec1dfa94d01930a3143b00df21297a73c45d0d3f588fed835697d8e560a576b05ec2bd93469c

    • SSDEEP

      196608:u1chh2Ys+B+nrWqdgOgHIxPGjGs92GNSkjGqIjHyn:uAhzn+nrWogOgeujGA2nkjMjH

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Looks for VirtualBox drivers on disk

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare drivers on disk

    • Modifies Windows Firewall

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks