Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    5f3bbcbfc3af0df3efbfa025309523f8d5d94fb80c23733c4ecc51a851f24146.exe

  • Size

    2.0MB

  • Sample

    241109-c8bl4swbkh

  • MD5

    39dcece0736e0185aa15fc863b0a30a6

  • SHA1

    04f92f565fb6ca84d5545715b9e04dfb1e0b5d2f

  • SHA256

    5f3bbcbfc3af0df3efbfa025309523f8d5d94fb80c23733c4ecc51a851f24146

  • SHA512

    89bc5241f0a407a6986d8a44dcb98a3ead579276a820f062db5ee7ce0aa744ceea67601ad40ffb79b511f619cf3d723e582d2e1e5c2b1bbef51ffd0e007828c4

  • SSDEEP

    49152:6trjeyT4BFh6Sh3U5oRLnzA4OvbVwhaen0ZVYQNWL:SeyT+T6Lo1nrQuh/d

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      5f3bbcbfc3af0df3efbfa025309523f8d5d94fb80c23733c4ecc51a851f24146.exe

    • Size

      2.0MB

    • MD5

      39dcece0736e0185aa15fc863b0a30a6

    • SHA1

      04f92f565fb6ca84d5545715b9e04dfb1e0b5d2f

    • SHA256

      5f3bbcbfc3af0df3efbfa025309523f8d5d94fb80c23733c4ecc51a851f24146

    • SHA512

      89bc5241f0a407a6986d8a44dcb98a3ead579276a820f062db5ee7ce0aa744ceea67601ad40ffb79b511f619cf3d723e582d2e1e5c2b1bbef51ffd0e007828c4

    • SSDEEP

      49152:6trjeyT4BFh6Sh3U5oRLnzA4OvbVwhaen0ZVYQNWL:SeyT+T6Lo1nrQuh/d

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.