Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Archive.zip
-
Size
42.5MB
-
Sample
240829-btp1hsycqq
-
MD5
e7c52468b677776f1df1e6516dfd5316
-
SHA1
836606b15db7efb24b0b92f39a501455b150bea5
-
SHA256
84d56d6bff9a2c5c359267fb6614f4b7078ff8e3092c5b709ceb6b038c2dc595
-
SHA512
9f9396aaad24d7c40fcea53abbfaabf5e62ab32beaddb9f73b8668b557a3b321d0466e38499e46e0ef55b91da78543c79b756f165befe942901a32311bb32842
-
SSDEEP
786432:wzSbSpTA2K0e9FMEfTVTtPNOGJ6rLPaGcRQFWGAp73KAUCwhiQPbp:weSpU2K0e9SeNVYLPHcRoUp73KAUCwVN
Static task
static1
Behavioral task
behavioral1
Sample
Archive.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Archive.zip
Resource
win11-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
23.106.253.194 - Port:
21 - Username:
user1947 - Password:
Z#e97Ms!$8
Targets
-
-
Target
Archive.zip
-
Size
42.5MB
-
MD5
e7c52468b677776f1df1e6516dfd5316
-
SHA1
836606b15db7efb24b0b92f39a501455b150bea5
-
SHA256
84d56d6bff9a2c5c359267fb6614f4b7078ff8e3092c5b709ceb6b038c2dc595
-
SHA512
9f9396aaad24d7c40fcea53abbfaabf5e62ab32beaddb9f73b8668b557a3b321d0466e38499e46e0ef55b91da78543c79b756f165befe942901a32311bb32842
-
SSDEEP
786432:wzSbSpTA2K0e9FMEfTVTtPNOGJ6rLPaGcRQFWGAp73KAUCwhiQPbp:weSpU2K0e9SeNVYLPHcRoUp73KAUCwVN
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1