Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    7471eb468a1f0166167f369bec578915.exe

  • Size

    2.2MB

  • Sample

    241027-w5jyvsykbv

  • MD5

    7471eb468a1f0166167f369bec578915

  • SHA1

    9ded35e930d112a8909dad6aaf1a657f65284588

  • SHA256

    9e52adafb9ddb7668e8c025ebd74a856434b0c4c487a6204fe750e683bc3dbe4

  • SHA512

    3f4abc590644d80a6fdebca9e0d2e1a28bbe220a2f48affa09707d9eaa0ab08077dfec58d6f3b78483459dd143cabd1c38ce3941f5766f06e0f1649b705078f8

  • SSDEEP

    49152:IBTj8WeJJUFAFQGoAgNCw0J1/XfkP/qcdi:yf8W7W8AtX83qcdi

Malware Config

Targets

    • Target

      7471eb468a1f0166167f369bec578915.exe

    • Size

      2.2MB

    • MD5

      7471eb468a1f0166167f369bec578915

    • SHA1

      9ded35e930d112a8909dad6aaf1a657f65284588

    • SHA256

      9e52adafb9ddb7668e8c025ebd74a856434b0c4c487a6204fe750e683bc3dbe4

    • SHA512

      3f4abc590644d80a6fdebca9e0d2e1a28bbe220a2f48affa09707d9eaa0ab08077dfec58d6f3b78483459dd143cabd1c38ce3941f5766f06e0f1649b705078f8

    • SSDEEP

      49152:IBTj8WeJJUFAFQGoAgNCw0J1/XfkP/qcdi:yf8W7W8AtX83qcdi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks