Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6ed51ee33a2ee2f7a63e23c9fb7086879feb2ba26f203885a44d809b8452a464

  • Size

    10.6MB

  • Sample

    241108-hraalsxgrh

  • MD5

    3b31347255f5e61bec01ff4fb2eba5eb

  • SHA1

    1dcccc78ea9ec4ee00f92fa9044247820d484638

  • SHA256

    6ed51ee33a2ee2f7a63e23c9fb7086879feb2ba26f203885a44d809b8452a464

  • SHA512

    9b2b26218eb871465de893c413a77bd141289972b83c9fe70dca7e65b61c9350924e91528272ce05c92290252c44a32b87cdfdaad202cac6d7ef053d5bce7f0b

  • SSDEEP

    196608:eVGPZfdhx7Q0I11U6Ge8qJen47uk6yjtH0KkQSTY4:eGnM0EG6Je47T6yjl0KIr

Malware Config

Extracted

Family

socelars

C2

http://www.ecgbg.com/

Extracted

Family

redline

Botnet

media23n

C2

65.108.69.168:16278

Attributes
  • auth_value

    187686d42fe6990103297406a32ce4af

Extracted

Family

redline

Botnet

user01new

C2

49.12.219.50:4846

Attributes
  • auth_value

    fcca1ed5af8553053dc74a4c6a9ce601

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e

    • Size

      10.6MB

    • MD5

      2d31d4fbad1650ec69c899a5417de3dd

    • SHA1

      621ba6e8907e372798440d711126f0b0a0d8ce2f

    • SHA256

      65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e

    • SHA512

      ac21c3aac43864449e0c135e9466bd368fe16131ba9bd54e754c22410d2b325f2cc525c33509c7fbab5d480d36833aa3bb08d470dec37444fbad5383e362c361

    • SSDEEP

      196608:xYLUCgA7XFU7WhMld/UnPejgM4YdJUB7vLzaDBuCUfvpQJfB/0Do05kWgX0q:x0dgkXFU7zCnPUgM4WUkBqRQ/BTkq

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Modifies Windows Firewall

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.