Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Cheat DEEP WEB.rar

  • Size

    6.9MB

  • Sample

    250119-1cc23awrds

  • MD5

    58795e27ded3bfc157e3f3bcbf7d7f72

  • SHA1

    5a4548536338d63cd348e530d1a7642c7472b802

  • SHA256

    0febdcc57349da7a79710b6cf65c7d6c73dfaeaad3ff7bafb73b936a7e222b4a

  • SHA512

    36face98f5ff0b629ea309bd4d8bdc16e3738041a8ab9f1af79f5afd5129c610d2c6e4940c4cb7a5fdfb80dab9a6bf163fc4b734d33348f3f23b1f9618f39cc8

  • SSDEEP

    196608:WRCzI0koatAmNUljyVzLGJUapTocbGDsrAzeEqq79M8iu:nV8tMYGJpM2GIAZl8u

Malware Config

Targets

    • Target

      LaSInject/LaSInject.exe

    • Size

      6.9MB

    • MD5

      b00cc9195c7f6c078ee86baa3275ead3

    • SHA1

      0c5e32dbf11ed61bfdec3ad321f83c8e66224520

    • SHA256

      ed361180fb612d5ae7a8eeab2d8d0a1657bd8bbed655fb43418bbffb080ac13b

    • SHA512

      80327efe6b98253edccf69df53b8ac432c390f3c2b040e117c4c4ba9b13a90adc4c16bbcd2b8333328bd8bc847f1f4f423e241a446bed9b2e006697e11bd81a8

    • SSDEEP

      196608:G1V1vFddB6ylnlPzf+JiJCsmFMvQn6hqgdh0:6FnBRlnlPSa7mmvQpgdh0

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      LaSInject/amboit.dll

    • Size

      619KB

    • MD5

      8e5926c798e62e3862e86d12bc2c09c1

    • SHA1

      4ef4655d38dd9354a70453f7dc363a6e69bb2ab4

    • SHA256

      652f86f48e144bedafb2346f3877d51e249aad3077dcf927602122fb82c30bdc

    • SHA512

      8bd6c40d4182861a1a96e0f443a9b04bf6f78de7c7047f1034fb16488ff7eed8b1072dac4ace3d9969f141dd217d91c3c5f5c8f1cba94846746b79259e9a155a

    • SSDEEP

      12288:ZVq3wZOtZ1oOH9HBFjj1rF6WR9QEKZm+jWodEEVIx:+b9HBFjdF99QEKZm+jWodEEWx

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.