Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3DDoS-Rippe...per.py
windows7-x64
3DDoS-Rippe...per.py
windows10-2004-x64
3DDoS-Rippe...t__.py
windows7-x64
3DDoS-Rippe...t__.py
windows10-2004-x64
3DDoS-Rippe...38.pyc
windows7-x64
3DDoS-Rippe...38.pyc
windows10-2004-x64
3DDoS-Rippe...rm.dll
windows7-x64
1DDoS-Rippe...rm.dll
windows10-2004-x64
1Resubmissions
08/09/2024, 09:49
240908-ltpd4aygpj 607/09/2024, 21:53
240907-1rsq3axcrn 307/09/2024, 21:50
240907-1qbq6axckp 307/09/2024, 21:47
240907-1nltcazblh 607/09/2024, 21:46
240907-1mtskazbja 307/09/2024, 21:44
240907-1lm9dszalh 607/09/2024, 21:41
240907-1jybksyhpc 8Analysis
-
max time kernel
420s -
max time network
1138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
DDoS-Ripper Pro/DRipper.py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DDoS-Ripper Pro/DRipper.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DDoS-Ripper Pro/pytransform/__init__.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DDoS-Ripper Pro/pytransform/__init__.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DDoS-Ripper Pro/pytransform/__pycache__/__init__.cpython-38.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
DDoS-Ripper Pro/pytransform/__pycache__/__init__.cpython-38.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DDoS-Ripper Pro/pytransform/_pytransform.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DDoS-Ripper Pro/pytransform/_pytransform.dll
Resource
win10v2004-20240802-en
General
-
Target
DDoS-Ripper Pro/DRipper.py
-
Size
47KB
-
MD5
836fb4703be19909e41c9b5f8db4b357
-
SHA1
b99ef3621d34d01597c4ebeda84a08584f630068
-
SHA256
2f8ffe7521b02a75326cbd70a1783294809fb0c6e3f6a02af72bdc86bf1d7b36
-
SHA512
b941cfa9519f9b021bffc67499ce9552015c72dcf2511b6d5500dc495e63e028fc3de9990ef17e842e0705f338d1520ab76ddac3c674641800b6a7eafaba0bec
-
SSDEEP
768:0H91otr8AvZxM6DoFUD6iNUTRUvbV8M3s30MoT3ECBY5jZIJZGmwKS:0HDO/6UD6iNYRQJ8Mc30plY5mJwmc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4792 OpenWith.exe