Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/01/2025, 20:51

250131-zngnysynhl 10

22/01/2025, 17:19

250122-vv8c2awqf1 10

22/01/2025, 16:20

250122-ts986swjel 10

22/01/2025, 13:44

250122-q2a9nayng1 10

22/01/2025, 13:43

250122-q1jjmszmel 10

22/01/2025, 13:42

250122-qz519ayncz 10

21/01/2025, 02:07

250121-cjzbwa1jhp 10

20/01/2025, 18:36

250120-w88fmasqfy 10

20/01/2025, 18:27

250120-w3q96asnh1 10

General

  • Target

    4363463463464363463463463.zip.zip

  • Size

    394KB

  • Sample

    250122-q1jjmszmel

  • MD5

    22872ef7f39c6c03422b358f867e69b7

  • SHA1

    263dbd53bf3e6766a11e0a0ce896e708be807aa0

  • SHA256

    12fce52d084a8c7efa638c88fa2307bca7c038a49fe566ebb05533cacf17efbd

  • SHA512

    d26020b40e03a1bc7dff4d872c9421e07681e4bb4bbf9172f063be7d81b060686f1091dd2603de30ae600cae250e4a94cd3f2909e88e2e26b796771b8eb6b817

  • SSDEEP

    12288:YGA+VQGlOa26BcdTJw3dzxdY4BAvcTCyY:YGfQGlg64NWv64AETI

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://bellflamre.click/api

Extracted

Family

xworm

Version

5.0

C2

event-dollar.gl.at.ply.gg:42627

Mutex

Vu8KDOzYd19RAWuh

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Desktop Window Manager.exe

  • telegram

    https://api.telegram.org/bot7269786725:AAF0IPx1BWTdW_vbZqP8HGNrxWWFpF5CvYs/sendMessage?chat_id=5465523859

aes.plain

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

217.195.195.46:1604

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      4363463463464363463463463.zip.zip

    • Size

      394KB

    • MD5

      22872ef7f39c6c03422b358f867e69b7

    • SHA1

      263dbd53bf3e6766a11e0a0ce896e708be807aa0

    • SHA256

      12fce52d084a8c7efa638c88fa2307bca7c038a49fe566ebb05533cacf17efbd

    • SHA512

      d26020b40e03a1bc7dff4d872c9421e07681e4bb4bbf9172f063be7d81b060686f1091dd2603de30ae600cae250e4a94cd3f2909e88e2e26b796771b8eb6b817

    • SSDEEP

      12288:YGA+VQGlOa26BcdTJw3dzxdY4BAvcTCyY:YGfQGlg64NWv64AETI

    Score
    1/10
    • Target

      4363463463464363463463463.zip

    • Size

      393KB

    • MD5

      c223234ed4e0bc5325c0b09744f06b6d

    • SHA1

      ecfdd884ee353ceb205be8729eb683aeca5cce2e

    • SHA256

      fda46baacb7dcd211250fe29aaa2b1b17657961675b4d8c6415a0c3d004d00a6

    • SHA512

      b36c66d8c4c3c2d46a24bb85bd165e71b862f1de8cdc600f343f12a0238e3a5b3d48cb91a06acd6e0024e30798ddc715c211b4d59a65197d8058e3c937df4d1f

    • SSDEEP

      6144:mw6UunfgHXYz9cZLa2MM1ZDQblzXhVqWvSI6Xr6i5OywSiTbBeqscDoAUll4QwjS:mJUKz9cB3MMnmd+W6vXmi5ONvMc05yQ

    • Lumma Stealer, LummaC

      Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

    • Lumma family

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

    • Target

      4363463463464363463463463.exe

    • Size

      764KB

    • MD5

      85e3d4ac5a6ef32fb93764c090ef32b7

    • SHA1

      adedb0aab26d15cf96f66fda8b4cfbbdcc15ef52

    • SHA256

      4e5cc8cb98584335400d00f0a0803c3e0202761f3fbe50bcab3858a80df255e1

    • SHA512

      a7a037bde41bcd425be18a712e27a793185f7fde638e139bbd9d253c371cd9622385eda39cf91ab715ead2591cff5b8c9f5b31d903f138d8af7bab6a9001ccab

    • SSDEEP

      12288:6MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ufbj:6nsJ39LyjbJkQFMhmC+6GD9mH

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Xred

      Xred is backdoor written in Delphi.

    • Xred family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks