Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/11/2024, 13:33 UTC

241130-qtt2ssvnht 10

30/11/2024, 12:40 UTC

241130-pwfrhsykgj 10

30/11/2024, 01:05 UTC

241130-bfj74svnf1 10

30/11/2024, 01:04 UTC

241130-bfebvszlbl 10

29/11/2024, 02:23 UTC

241129-cvhs9svpep 10

28/11/2024, 20:40 UTC

241128-zftnjsvqer 10

28/11/2024, 15:00 UTC

241128-sdtgfa1let 10

28/11/2024, 02:05 UTC

241128-chyzqawqbm 10

28/11/2024, 00:14 UTC

241128-ajcf1asraj 10

27/11/2024, 23:38 UTC

241127-3m3rks1rcr 10

General

  • Target

    nezurr.exe

  • Size

    7.5MB

  • Sample

    241121-2ms2pstjhn

  • MD5

    92c47cbd15a6099a4da50d726015508c

  • SHA1

    91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8

  • SHA256

    f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7

  • SHA512

    00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946

  • SSDEEP

    196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf

Malware Config

Targets

    • Target

      nezurr.exe

    • Size

      7.5MB

    • MD5

      92c47cbd15a6099a4da50d726015508c

    • SHA1

      91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8

    • SHA256

      f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7

    • SHA512

      00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946

    • SSDEEP

      196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.