Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.zip
-
Size
29.3MB
-
Sample
250208-ytynzs1ngz
-
MD5
f8e93df5e63f70eb2adfd3fd0e2cc666
-
SHA1
b1a6c74bcae4326b6553eb303e6259490bdf9354
-
SHA256
84feffbf46b0b4fab9e5d81b3be2b68418fe2660e67393adb8cba50c9e44a901
-
SHA512
7870b984d0d002f6786335e9f3c51d83b905ed91263dc0b988227757d5568935f882d2c9d1209f2dd9037c1f47e8814e25b0958009fa70c8fa315fe16bf7c2c8
-
SSDEEP
786432:TgqvL4mZBbVHF/N+zE8NYxCxql8GUmzeIXfR9n5E:TgPmZRVeQ8Vqv1zeAfR9n5E
Static task
static1
Behavioral task
behavioral1
Sample
6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.exe
Resource
win7-20241010-de
Behavioral task
behavioral2
Sample
6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.exe
Resource
win10v2004-20250207-de
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
stealer
environmental-seeds.gl.at.ply.gg:35534
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Extracted
njrat
Platinum
Windows
127.0.0.1:10454
windows.exe
-
reg_key
windows.exe
-
splitter
|Ghost|
Targets
-
-
Target
6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9.exe
-
Size
29.5MB
-
MD5
d83d5ff23292103a65b43fbd42b7f243
-
SHA1
b27e29d090712a2cf50d17a17fb1a8f78fba8aec
-
SHA256
6df749c99fac5bc1097bdd0566120dbd7f38aa392b06227b66efff14412b80c9
-
SHA512
7dc52a8d2eb202603f27cf9addd9c4cc08de289d041b0e4960917354251dae407c9485b864c0d81bad623eda45fa23078205d6e30ac4909c15be3e5961ed35da
-
SSDEEP
786432:a97LDzYHKsqAK/DxlMwVbrxpstnsnxzxP3LLv:o7LfgOh/TMQ3OnMxtPv
-
Njrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Peripheral Device Discovery
1Process Discovery
1Query Registry
2System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1