Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    BootstrapperV1.19.exe

  • Size

    18.6MB

  • Sample

    240914-3pbqwateka

  • MD5

    67fa92fb14f9142387c0562def056943

  • SHA1

    6c5fb554337f815b74ce44c5a40ef3d990325605

  • SHA256

    fa8426dd149de6f737b5f172f8ed6a4781c9647112e51a48e570b9d2785eb6a5

  • SHA512

    bd1d5c6af500702c0b92172d9807ba4d114e351697d099599ba85c14a240d8dca930cd976ba0813e16ae0ca2806a63a7a558b3094e50507b266dab0f15fe14fd

  • SSDEEP

    393216:OqPnLFXlr4mQ8DOETgsvfGTgWSmcu5vE42ri6fLBm:DPLFXN/QhESF8uuli6A

Malware Config

Targets

    • Target

      BootstrapperV1.19.exe

    • Size

      18.6MB

    • MD5

      67fa92fb14f9142387c0562def056943

    • SHA1

      6c5fb554337f815b74ce44c5a40ef3d990325605

    • SHA256

      fa8426dd149de6f737b5f172f8ed6a4781c9647112e51a48e570b9d2785eb6a5

    • SHA512

      bd1d5c6af500702c0b92172d9807ba4d114e351697d099599ba85c14a240d8dca930cd976ba0813e16ae0ca2806a63a7a558b3094e50507b266dab0f15fe14fd

    • SSDEEP

      393216:OqPnLFXlr4mQ8DOETgsvfGTgWSmcu5vE42ri6fLBm:DPLFXN/QhESF8uuli6A

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks