Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1

  • Size

    298KB

  • Sample

    241211-ybpy5azqbn

  • MD5

    92296d857af6810585aab00a73289227

  • SHA1

    12ce881fdb925f146d2a906791fdebdb11736948

  • SHA256

    0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1

  • SHA512

    dda61c366187324b1b32050a4cbde976716be7097bb93a5a061eda0c7debc980de5ecaffe067757850b5a04ec1ef5434dc76e31a6fd9be5fafe4071935a7c24f

  • SSDEEP

    3072:rWDK/Vq2xuZK5g2evjWPQM//xrkK3zODF1czQiTKyqNP9Rg9CEG8g:KDgoUuZKbaj4kjcTqgCB

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Targets

    • Target

      0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1

    • Size

      298KB

    • MD5

      92296d857af6810585aab00a73289227

    • SHA1

      12ce881fdb925f146d2a906791fdebdb11736948

    • SHA256

      0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1

    • SHA512

      dda61c366187324b1b32050a4cbde976716be7097bb93a5a061eda0c7debc980de5ecaffe067757850b5a04ec1ef5434dc76e31a6fd9be5fafe4071935a7c24f

    • SSDEEP

      3072:rWDK/Vq2xuZK5g2evjWPQM//xrkK3zODF1czQiTKyqNP9Rg9CEG8g:KDgoUuZKbaj4kjcTqgCB

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.