Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-08-26_33e42c6132738421fbd8d41e90e9fe65_poet-rat_snatch

  • Size

    14.0MB

  • Sample

    240826-rwjvaazejm

  • MD5

    33e42c6132738421fbd8d41e90e9fe65

  • SHA1

    5595d55fd350e9c5b86dab3ad34801e3b6f4ed54

  • SHA256

    42a5e5b6f7d8a8050ee447b10eb4d40f4139384eae540c2478eb5f245b169454

  • SHA512

    0d0959e7509d16a521867448336a5f769697eb8afbd0a7958a82fd1b09035c406739669773dc3b9e82b97e61ca13b9fbf590c17c79ed48539bcb5078d45213fe

  • SSDEEP

    196608:/TcP4exdPjzqkplq6Vk/0zhXYt9zFJ4JeIr9U+:/E4+zqkRVM0zWt95J4eIP

Malware Config

Extracted

Family

thunderkittystealer

C2

https://api.telegram.org/bot7396255266:AAGy7EZCzaG6ueQ7f4qXBPwmwf_1M_OCqDk/sendMessage?chat_id=6508120798

Targets

    • Target

      2024-08-26_33e42c6132738421fbd8d41e90e9fe65_poet-rat_snatch

    • Size

      14.0MB

    • MD5

      33e42c6132738421fbd8d41e90e9fe65

    • SHA1

      5595d55fd350e9c5b86dab3ad34801e3b6f4ed54

    • SHA256

      42a5e5b6f7d8a8050ee447b10eb4d40f4139384eae540c2478eb5f245b169454

    • SHA512

      0d0959e7509d16a521867448336a5f769697eb8afbd0a7958a82fd1b09035c406739669773dc3b9e82b97e61ca13b9fbf590c17c79ed48539bcb5078d45213fe

    • SSDEEP

      196608:/TcP4exdPjzqkplq6Vk/0zhXYt9zFJ4JeIr9U+:/E4+zqkRVM0zWt95J4eIP

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Modifies Windows Firewall

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks