Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    78552fc18f6d078a9d0d74fbe0b8a30a53d9e7b30d6eda133cfafab05a3e4c4a

  • Size

    1.4MB

  • Sample

    250122-d5jc8awmgv

  • MD5

    b43b0598452973a53f31bcf77078c229

  • SHA1

    c4ad086eabab265ef0111de7869d8928537a370b

  • SHA256

    78552fc18f6d078a9d0d74fbe0b8a30a53d9e7b30d6eda133cfafab05a3e4c4a

  • SHA512

    d492a5ab1b556c3965de4b7fd3761f9e19329fd34baca8fbbf88f928da5a9c692e0896dec45638aeb9619c092230076a4e9d56e83f70e1637246b750cabb8d3b

  • SSDEEP

    24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYP:Fo0c++OCokGs9Fa+rd1f26RNYP

Malware Config

Extracted

Family

netwire

C2

Wealthy2019.com.strangled.net:20190

wealthyme.ddns.net:20190

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    sunshineslisa

  • install_path

    %AppData%\Imgburn\Host.exe

  • keylogger_dir

    %AppData%\Logs\Imgburn\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    sucess

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

warzonerat

C2

wealth.warzonedns.com:5202

Targets

    • Target

      78552fc18f6d078a9d0d74fbe0b8a30a53d9e7b30d6eda133cfafab05a3e4c4a

    • Size

      1.4MB

    • MD5

      b43b0598452973a53f31bcf77078c229

    • SHA1

      c4ad086eabab265ef0111de7869d8928537a370b

    • SHA256

      78552fc18f6d078a9d0d74fbe0b8a30a53d9e7b30d6eda133cfafab05a3e4c4a

    • SHA512

      d492a5ab1b556c3965de4b7fd3761f9e19329fd34baca8fbbf88f928da5a9c692e0896dec45638aeb9619c092230076a4e9d56e83f70e1637246b750cabb8d3b

    • SSDEEP

      24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYP:Fo0c++OCokGs9Fa+rd1f26RNYP

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Netwire family

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.