Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.zip

  • Size

    29.3MB

  • Sample

    250208-ytynzs1ngz

  • MD5

    f8e93df5e63f70eb2adfd3fd0e2cc666

  • SHA1

    b1a6c74bcae4326b6553eb303e6259490bdf9354

  • SHA256

    84feffbf46b0b4fab9e5d81b3be2b68418fe2660e67393adb8cba50c9e44a901

  • SHA512

    7870b984d0d002f6786335e9f3c51d83b905ed91263dc0b988227757d5568935f882d2c9d1209f2dd9037c1f47e8814e25b0958009fa70c8fa315fe16bf7c2c8

  • SSDEEP

    786432:TgqvL4mZBbVHF/N+zE8NYxCxql8GUmzeIXfR9n5E:TgPmZRVeQ8Vqv1zeAfR9n5E

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

stealer

C2

environmental-seeds.gl.at.ply.gg:35534

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Extracted

Family

njrat

Version

Platinum

Botnet

Windows

C2

127.0.0.1:10454

Mutex

windows.exe

Attributes
  • reg_key

    windows.exe

  • splitter

    |Ghost|

Targets

    • Target

      6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.exe

    • Size

      29.5MB

    • MD5

      d83d5ff23292103a65b43fbd42b7f243

    • SHA1

      b27e29d090712a2cf50d17a17fb1a8f78fba8aec

    • SHA256

      6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9

    • SHA512

      7dc52a8d2eb202603f27cf9addd9c4cc08de289d041b0e4960917354251dae407c9485b864c0d81bad623eda45fa23078205d6e30ac4909c15be3e5961ed35da

    • SSDEEP

      786432:a97LDzYHKsqAK/DxlMwVbrxpstnsnxzxP3LLv:o7LfgOh/TMQ3OnMxtPv

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks