Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    3ef7a2f1d060f050b9c979d7f1257b48000f2228221963fa24aa37fb703a1fc9.exe

  • Size

    2.0MB

  • Sample

    250108-p6exzasrdq

  • MD5

    26dd4843ac07ce279ede80af797454f0

  • SHA1

    a62bf5ce5ffd33cad66c8c134ba215082aedd81a

  • SHA256

    3ef7a2f1d060f050b9c979d7f1257b48000f2228221963fa24aa37fb703a1fc9

  • SHA512

    85caff9b20456ad3ac5a654dd56f34a5508236d96cc84c4cfe92ce085adfaad1094c9770cc2501390c3b1dd642b4158ee8b5e28ce940f5dbca89902269e5ee7e

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYZ:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yf

Malware Config

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Targets

    • Target

      3ef7a2f1d060f050b9c979d7f1257b48000f2228221963fa24aa37fb703a1fc9.exe

    • Size

      2.0MB

    • MD5

      26dd4843ac07ce279ede80af797454f0

    • SHA1

      a62bf5ce5ffd33cad66c8c134ba215082aedd81a

    • SHA256

      3ef7a2f1d060f050b9c979d7f1257b48000f2228221963fa24aa37fb703a1fc9

    • SHA512

      85caff9b20456ad3ac5a654dd56f34a5508236d96cc84c4cfe92ce085adfaad1094c9770cc2501390c3b1dd642b4158ee8b5e28ce940f5dbca89902269e5ee7e

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYZ:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yf

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.