Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe

  • Size

    1.9MB

  • Sample

    250114-c6jvpstrgv

  • MD5

    04095b54d4245dca4aeb05310a2ddc8a

  • SHA1

    4d5bc54fade2e8af35d36ae0cab2c0f835cb7334

  • SHA256

    7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c

  • SHA512

    f666c5f973a67aeb3d56b2055884267f2fd892634c2267dbd0e29965285dc05d876658fa944100bafe572b66061a8a7caefd3b1e650ee9302ae229255a8a854f

  • SSDEEP

    49152:OB8cSz7LU1B6RIML97yovHGfx8UINTPWUznpd:QEvKB6WMBvqnIJx

Malware Config

Targets

    • Target

      7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe

    • Size

      1.9MB

    • MD5

      04095b54d4245dca4aeb05310a2ddc8a

    • SHA1

      4d5bc54fade2e8af35d36ae0cab2c0f835cb7334

    • SHA256

      7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c

    • SHA512

      f666c5f973a67aeb3d56b2055884267f2fd892634c2267dbd0e29965285dc05d876658fa944100bafe572b66061a8a7caefd3b1e650ee9302ae229255a8a854f

    • SSDEEP

      49152:OB8cSz7LU1B6RIML97yovHGfx8UINTPWUznpd:QEvKB6WMBvqnIJx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.