Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    10e933944fd38d4087f252443a6c1ce57e6fe76e59829a8eb5e1930982120b70

  • Size

    1.2MB

  • Sample

    241114-yeb7fasdjh

  • MD5

    89f7f56c99807e8a8b0d39df66b64c9c

  • SHA1

    138139e54a2956ef71ad49d303f4e35101f1297b

  • SHA256

    10e933944fd38d4087f252443a6c1ce57e6fe76e59829a8eb5e1930982120b70

  • SHA512

    f6b631ec7e113ea1c46dd94a52983ee385c832a9d3b22692f8e3b957955ad2cbe9fa1373b26f7ea888f4c8c167b83b2c016de645fb9f5835b577c419359d9300

  • SSDEEP

    24576:UhntGx9yVf41ob4s6ABttGZOATIZXTnR1e:UtGZ1oEEbG8xXje

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    bigdollar99@zoho.com
  • Password:
    Diego1986

Targets

    • Target

      10e933944fd38d4087f252443a6c1ce57e6fe76e59829a8eb5e1930982120b70

    • Size

      1.2MB

    • MD5

      89f7f56c99807e8a8b0d39df66b64c9c

    • SHA1

      138139e54a2956ef71ad49d303f4e35101f1297b

    • SHA256

      10e933944fd38d4087f252443a6c1ce57e6fe76e59829a8eb5e1930982120b70

    • SHA512

      f6b631ec7e113ea1c46dd94a52983ee385c832a9d3b22692f8e3b957955ad2cbe9fa1373b26f7ea888f4c8c167b83b2c016de645fb9f5835b577c419359d9300

    • SSDEEP

      24576:UhntGx9yVf41ob4s6ABttGZOATIZXTnR1e:UtGZ1oEEbG8xXje

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.