Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
OneStopShop.zip
-
Size
11.0MB
-
Sample
241227-vnxyqaxles
-
MD5
08c3f994392c991d7a23c435ddaf6e70
-
SHA1
3cf30490ccc7321a204f627861772f64201a2c54
-
SHA256
b348bbc6e7e76bfdaf053e6df3eb41f5dddce5049cdbda65c1b7386fcc183392
-
SHA512
fcd2e657ec9354facb1c6391f1a376ccf769be2a22e6fd4168c9c9556bfc42afe29288730d123980e5f41f9096b3a02849e7ad4f1cc8106dc1789339eb6996ba
-
SSDEEP
196608:LI25YglEcfIDz3KcGRCxirftcTaJqcb85EEOEidunmzoftvbW4nh2nDkWimDkm7W:3D0RGRffIWwmcTK4W9vR4I/QnGwGU
Static task
static1
Behavioral task
behavioral1
Sample
OneStopShop.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
BoostTool.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Data/Avatar/logo.png
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Data/Banners/logo.png
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Data/Output/[nigga] [2024-10-01] [2x 1 Month]/Failed.txt
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
settings.json
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Targets
-
-
Target
OneStopShop.zip
-
Size
11.0MB
-
MD5
08c3f994392c991d7a23c435ddaf6e70
-
SHA1
3cf30490ccc7321a204f627861772f64201a2c54
-
SHA256
b348bbc6e7e76bfdaf053e6df3eb41f5dddce5049cdbda65c1b7386fcc183392
-
SHA512
fcd2e657ec9354facb1c6391f1a376ccf769be2a22e6fd4168c9c9556bfc42afe29288730d123980e5f41f9096b3a02849e7ad4f1cc8106dc1789339eb6996ba
-
SSDEEP
196608:LI25YglEcfIDz3KcGRCxirftcTaJqcb85EEOEidunmzoftvbW4nh2nDkWimDkm7W:3D0RGRffIWwmcTK4W9vR4I/QnGwGU
-
Xred family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
BoostTool.exe
-
Size
10.6MB
-
MD5
cb598ffa05078fd9ee2ff6b1b52d9d34
-
SHA1
31fcc9e65912072aac8e14c6bd87aad7d06133b6
-
SHA256
2db90eb0a3f229be32d32b949b3aa715c66d7525dc6b50f0d744a677bfbd617d
-
SHA512
3cad964a7fe44e466a0a9159610f4d232bdae811ad9624918b8f57243b42f1d8dea9ef526b977976b7068877963183625429e90252c2378d16f04ce6b40a9c8d
-
SSDEEP
196608:+IY6xgFW1A9/UD1zJwLUf6WPvC1kD9ayyJXsZYaEK0bOPMpy5NxHAa3hqPF6kqau:Z2J0CLC6wvRm1+0kJ+Ek7RbcCvo
-
Xred family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Data/Avatar/logo.png
-
Size
225KB
-
MD5
740c4d360d784747ca418ae980bd9ee9
-
SHA1
535b6b153ba1f57d27298f132442b72beadc7737
-
SHA256
a64c47bf9bda46ada462443471921400e60d98c94219e8db9244b72d6ddfc268
-
SHA512
0c5b3ad5db336f74c7c40d4c39b694b44fcd3decdf82539c0970d3798ebddbe7813f02f3cca783e68933b580734159fd7d9046d84164a4c7b155ea51a3cfbc79
-
SSDEEP
6144:xmPLyQHQgYNRSHZhKNwKMh1bWPBHNS+vuZLy:xmTyQ7YNRSHZhKNJMuZtScuZLy
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Data/Banners/logo.png
-
Size
225KB
-
MD5
740c4d360d784747ca418ae980bd9ee9
-
SHA1
535b6b153ba1f57d27298f132442b72beadc7737
-
SHA256
a64c47bf9bda46ada462443471921400e60d98c94219e8db9244b72d6ddfc268
-
SHA512
0c5b3ad5db336f74c7c40d4c39b694b44fcd3decdf82539c0970d3798ebddbe7813f02f3cca783e68933b580734159fd7d9046d84164a4c7b155ea51a3cfbc79
-
SSDEEP
6144:xmPLyQHQgYNRSHZhKNwKMh1bWPBHNS+vuZLy:xmTyQ7YNRSHZhKNJMuZtScuZLy
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Data/Output/[nigga] [2024-10-01] [2x 1 Month]/Failed.txt
-
Size
1B
-
MD5
68b329da9893e34099c7d8ad5cb9c940
-
SHA1
adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
-
SHA256
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
-
SHA512
be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09
Score1/10 -
-
-
Target
settings.json
-
Size
708B
-
MD5
8c2156c75bce66d2a127253d89d4e79f
-
SHA1
8277586c8f3f9d38e819a5266c4a935386ea782f
-
SHA256
8a6f038eb95031a66b34c9ec4b69ad091a8c75b8716fb42ddf6dbee6c73b1c76
-
SHA512
334aff4e0cd7cd1b75668a0fb3e8ae0519172285196a8ce72c421e5bc9a1bee8807ed94637a6bf00dcfdf9e763002470de1593fccbcbeb6e19edca8a2ad48880
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1