Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_870bebe223ce4a6255703f3a459bcfb1

  • Size

    2.9MB

  • Sample

    250203-lkl8daxlht

  • MD5

    870bebe223ce4a6255703f3a459bcfb1

  • SHA1

    398e8819c0bb4d3a9bfad9b8359fff8a5c87240b

  • SHA256

    877343afeb9829d73c0168a95d13cd00ea8c50fe66a8b7c0dd813cbc5aca169d

  • SHA512

    4bd5efcc586e0f9450dba530f26f3a7ab571a3555268f15a364b351b8d7e69d418535e16a0ce29c4512eb3aa79e65d167752fd9a8bfe8798a6cfa5af0a9a77cb

  • SSDEEP

    49152:5ajzZxhW8oPZdoaknsXph0Q66odrSEOnnwaJVAmKCY0NEsfi35krR42cm461Z9Tw:QjzZ7cssXpW6ErtOnwaJVAjCY0WdpuNa

Malware Config

Targets

    • Target

      JaffaCakes118_870bebe223ce4a6255703f3a459bcfb1

    • Size

      2.9MB

    • MD5

      870bebe223ce4a6255703f3a459bcfb1

    • SHA1

      398e8819c0bb4d3a9bfad9b8359fff8a5c87240b

    • SHA256

      877343afeb9829d73c0168a95d13cd00ea8c50fe66a8b7c0dd813cbc5aca169d

    • SHA512

      4bd5efcc586e0f9450dba530f26f3a7ab571a3555268f15a364b351b8d7e69d418535e16a0ce29c4512eb3aa79e65d167752fd9a8bfe8798a6cfa5af0a9a77cb

    • SSDEEP

      49152:5ajzZxhW8oPZdoaknsXph0Q66odrSEOnnwaJVAmKCY0NEsfi35krR42cm461Z9Tw:QjzZ7cssXpW6ErtOnwaJVAjCY0WdpuNa

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks