Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    194073470fba4de22e1c88dacfd7a2b8719586e4614d22371bcbe2cc0267c5f6.exe

  • Size

    2.5MB

  • Sample

    250115-3ltsaa1ndq

  • MD5

    6e7a558a3aed704c4f3d087e74d58800

  • SHA1

    69b96f97748dd4e5aa6b07f1c0c69acb3107db57

  • SHA256

    194073470fba4de22e1c88dacfd7a2b8719586e4614d22371bcbe2cc0267c5f6

  • SHA512

    a5c2f142dfced1091e3a533937d53e27164445279717ad02f2988f705e7da9ffa40a8f63e9b9eac2fec804caf7125af76db5135170df179200d30947405ce3c9

  • SSDEEP

    49152:BTmiAznN8OLA03GMjKoZYz+WqE3GMAsH4wDnyBMzTvAaULscNpVQPUmXqs:0iAzSOLA0cooNrkSD6brVlq

Malware Config

Targets

    • Target

      194073470fba4de22e1c88dacfd7a2b8719586e4614d22371bcbe2cc0267c5f6.exe

    • Size

      2.5MB

    • MD5

      6e7a558a3aed704c4f3d087e74d58800

    • SHA1

      69b96f97748dd4e5aa6b07f1c0c69acb3107db57

    • SHA256

      194073470fba4de22e1c88dacfd7a2b8719586e4614d22371bcbe2cc0267c5f6

    • SHA512

      a5c2f142dfced1091e3a533937d53e27164445279717ad02f2988f705e7da9ffa40a8f63e9b9eac2fec804caf7125af76db5135170df179200d30947405ce3c9

    • SSDEEP

      49152:BTmiAznN8OLA03GMjKoZYz+WqE3GMAsH4wDnyBMzTvAaULscNpVQPUmXqs:0iAzSOLA0cooNrkSD6brVlq

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks