Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    AB-SSP (TROJANA GENERATICOS - MEMECAT DEATHER WINDOWS .rar

  • Size

    30.1MB

  • Sample

    241005-14nb4svanl

  • MD5

    c58d50d9f3a459ef0fc9a3a1beadf624

  • SHA1

    5c27586448f0168dae0502fb1ca8b5b0f6aff035

  • SHA256

    12bb854b6d0f65952e8420885232b644750e33d9cf3ee450a92110a526533192

  • SHA512

    1e4cdf964d95a697f6990c2e61fcc47f6af53d988e7fcde2e03a0a686e1b6b9ac27d21bb31be38b72883a721724e5995a884d72ff02c75a90e6b15af5b00f256

  • SSDEEP

    786432:yYXaswmBYPOGspvfLLlgtOz4m2dQfMVh5RCymN3:xW9GdnCYMj5RCp3

Malware Config

Targets

    • Target

      AB-SSP (TROJANA GENERATICOS - MEMECAT DEATHER WINDOWS .rar

    • Size

      30.1MB

    • MD5

      c58d50d9f3a459ef0fc9a3a1beadf624

    • SHA1

      5c27586448f0168dae0502fb1ca8b5b0f6aff035

    • SHA256

      12bb854b6d0f65952e8420885232b644750e33d9cf3ee450a92110a526533192

    • SHA512

      1e4cdf964d95a697f6990c2e61fcc47f6af53d988e7fcde2e03a0a686e1b6b9ac27d21bb31be38b72883a721724e5995a884d72ff02c75a90e6b15af5b00f256

    • SSDEEP

      786432:yYXaswmBYPOGspvfLLlgtOz4m2dQfMVh5RCymN3:xW9GdnCYMj5RCp3

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks