Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    24bc19a322474fd23e4feee15d6a6197140f7d68a4bea4f262fe7fca5f0995a5N

  • Size

    1.0MB

  • Sample

    241103-ged8cswhmn

  • MD5

    7d6336ff26a0f15489b6a0714bf4fe70

  • SHA1

    935301de20665aa658b80d6317b1dc4e53386447

  • SHA256

    24bc19a322474fd23e4feee15d6a6197140f7d68a4bea4f262fe7fca5f0995a5

  • SHA512

    067569e951c16f3b121076a9ff5bed9241b9ab102138e5a42eb43fa93922e2973e09e88f90c8fd5823731e830667f0ad7d79371faf2b6141796949e90db8c7f0

  • SSDEEP

    24576:ZVb5KPAdOzVmG3zd+YIDT8Jf3pbV13Jks:ZVhOhd+YI8t5X

Malware Config

Targets

    • Target

      24bc19a322474fd23e4feee15d6a6197140f7d68a4bea4f262fe7fca5f0995a5N

    • Size

      1.0MB

    • MD5

      7d6336ff26a0f15489b6a0714bf4fe70

    • SHA1

      935301de20665aa658b80d6317b1dc4e53386447

    • SHA256

      24bc19a322474fd23e4feee15d6a6197140f7d68a4bea4f262fe7fca5f0995a5

    • SHA512

      067569e951c16f3b121076a9ff5bed9241b9ab102138e5a42eb43fa93922e2973e09e88f90c8fd5823731e830667f0ad7d79371faf2b6141796949e90db8c7f0

    • SSDEEP

      24576:ZVb5KPAdOzVmG3zd+YIDT8Jf3pbV13Jks:ZVhOhd+YI8t5X

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.