Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    f6160644852c1d8ba584d5a2da6749b905c9f37d72a0d239f76c00eaa40f48f6N

  • Size

    2.0MB

  • Sample

    241012-stxtss1hrj

  • MD5

    b7f1de7e2c05646925ec2034aade1560

  • SHA1

    207cc8a93d6300ebe4ec3e644f40efb9dce29f76

  • SHA256

    f6160644852c1d8ba584d5a2da6749b905c9f37d72a0d239f76c00eaa40f48f6

  • SHA512

    80d3f672ad0d68db8bd712a132a1f9c3026012345ead099ec65ec58ab07b5746456ae315803d2bd169d419af30b9e42d1ebd770e1120f32e95a601e733a1165f

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yy

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Targets

    • Target

      f6160644852c1d8ba584d5a2da6749b905c9f37d72a0d239f76c00eaa40f48f6N

    • Size

      2.0MB

    • MD5

      b7f1de7e2c05646925ec2034aade1560

    • SHA1

      207cc8a93d6300ebe4ec3e644f40efb9dce29f76

    • SHA256

      f6160644852c1d8ba584d5a2da6749b905c9f37d72a0d239f76c00eaa40f48f6

    • SHA512

      80d3f672ad0d68db8bd712a132a1f9c3026012345ead099ec65ec58ab07b5746456ae315803d2bd169d419af30b9e42d1ebd770e1120f32e95a601e733a1165f

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yy

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.