Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

19/11/2024, 10:46 UTC

241119-mt7q4svbne 10

19/11/2024, 10:46 UTC

241119-mt33xsvhjl 10

19/11/2024, 10:44 UTC

241119-ms88jsvgrm 10

General

  • Target

    Skyloader.exe

  • Size

    7.4MB

  • Sample

    241119-mt33xsvhjl

  • MD5

    9aafb39140717dcefd4c14204db1cf4f

  • SHA1

    e9e4e7fb27ea230ae020fed1f2f7a448ceb9e055

  • SHA256

    d962b1389af10329f10adc601df6df39c338fb9ebbe423de2ae75f68006e4637

  • SHA512

    02f4f4279179704bb21becaed65667860f4595619ecf5e23f73686d5374fc260fd09552eeac2defecb624cb28bd120c9a7769f6643ba43870f308ae48f578302

  • SSDEEP

    196608:0yYShEmTOshoKMuIkhVastRL5Di3uV1DV5:nYSyyOshouIkPftRL54u35

Malware Config

Targets

    • Target

      Skyloader.exe

    • Size

      7.4MB

    • MD5

      9aafb39140717dcefd4c14204db1cf4f

    • SHA1

      e9e4e7fb27ea230ae020fed1f2f7a448ceb9e055

    • SHA256

      d962b1389af10329f10adc601df6df39c338fb9ebbe423de2ae75f68006e4637

    • SHA512

      02f4f4279179704bb21becaed65667860f4595619ecf5e23f73686d5374fc260fd09552eeac2defecb624cb28bd120c9a7769f6643ba43870f308ae48f578302

    • SSDEEP

      196608:0yYShEmTOshoKMuIkhVastRL5Di3uV1DV5:nYSyyOshouIkPftRL54u35

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �&���E.pyc

    • Size

      1KB

    • MD5

      d8e6db8dc9ec41a4bfc9bee82952f6e7

    • SHA1

      56cbac88836e54fb14dbd1086b06a1e1832e5e9c

    • SHA256

      4a65e9c6bd5f39bcb2d7ad553626fade7f0e1883946d7e8c902f068bd6e01b5f

    • SHA512

      4193328761509c0ea59cc9e08cbf62d2f2790e2f6d4fd570ecc340551e2f65e27d1ca9b6e1ea7a9676e0ee51e4809d44aa654f8352dd84575df936f67a10e368

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.