Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    33f3dcd2887759e1bac37615ea8a60f48a4bdcc2390a88209e30f7fcee433370.exe

  • Size

    1.4MB

  • Sample

    241201-p8wnhawnhl

  • MD5

    9a2b6f1aedbf159055d6724417210d60

  • SHA1

    2e850215bbe2884efe9d58bcdb848457ddd860fd

  • SHA256

    33f3dcd2887759e1bac37615ea8a60f48a4bdcc2390a88209e30f7fcee433370

  • SHA512

    0a74c5961f6592b12617ec69c324442b66efbb9f892673a3fe22dd1debb6017d18de7ff67c40d2b9cb0c6f0fccbd212575f37263e52d2509849a0c75de33e169

  • SSDEEP

    24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYx:Fo0c++OCokGs9Fa+rd1f26RNYx

Malware Config

Extracted

Family

netwire

C2

Wealthy2019.com.strangled.net:20190

wealthyme.ddns.net:20190

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    sunshineslisa

  • install_path

    %AppData%\Imgburn\Host.exe

  • keylogger_dir

    %AppData%\Logs\Imgburn\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    sucess

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

warzonerat

C2

wealth.warzonedns.com:5202

Targets

    • Target

      33f3dcd2887759e1bac37615ea8a60f48a4bdcc2390a88209e30f7fcee433370.exe

    • Size

      1.4MB

    • MD5

      9a2b6f1aedbf159055d6724417210d60

    • SHA1

      2e850215bbe2884efe9d58bcdb848457ddd860fd

    • SHA256

      33f3dcd2887759e1bac37615ea8a60f48a4bdcc2390a88209e30f7fcee433370

    • SHA512

      0a74c5961f6592b12617ec69c324442b66efbb9f892673a3fe22dd1debb6017d18de7ff67c40d2b9cb0c6f0fccbd212575f37263e52d2509849a0c75de33e169

    • SSDEEP

      24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYx:Fo0c++OCokGs9Fa+rd1f26RNYx

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.