Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    viruses.7z

  • Size

    58.0MB

  • Sample

    250211-hh8rtazjes

  • MD5

    b53cfcb8be406b2e948a7237db455b98

  • SHA1

    cbf66d0120b28690578b02462bf31d2c9eff5d9f

  • SHA256

    6f55f3d21550efb245e1208922f24195f31737591d1c493553a989be80eec0dd

  • SHA512

    4245d32db250c759aefc271864aed9280ba28e52da99f9d630ffb8e8547057829da7052cd2d098645ca129357411e394e5dfc36ddb7b3d1f4f103e323c3c8b0e

  • SSDEEP

    1572864:fpyk0ehdG1JDwT+4iWi82yGDVMAQuYSn3cA1:RF0ehGwT+Qi8HGxMA4mc+

Malware Config

Targets

    • Target

      passwd.exe

    • Size

      10.0MB

    • MD5

      6c7345f80de6e0d5b32351be100a2279

    • SHA1

      f5ef6f10a2cab097997fddfa891a728119900549

    • SHA256

      36c3f97c77b6cc7871006ed40962ad8812389ce4d26787579789340820a6a135

    • SHA512

      3823fdeeef994b68bba37b463e383585a455932637f0dd167e9fd018a3bf1445855c34432b90fe5fe32447853ad94a026578da3010c2db4a8b2742acb7fff04b

    • SSDEEP

      196608:zWc0ejQ3SfeNTfm/pf+xk4dWRimrbW3jmyr:uCcy/pWu4kRimrbmy8

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      szczur.exe

    • Size

      60.0MB

    • MD5

      9b7a4089dbad1e1e2b8a2a148ac3a74d

    • SHA1

      3aec6c418e70a5d2f5addbaa7095ce66e0a40aaf

    • SHA256

      f5a543375778ed6ecd291be0c20651f0b176271cd0d48ccab7506d5a9b1f3f31

    • SHA512

      e88384fbe0c048b35bf78fb6408ed6d9bc44898258a80bb4e417be8bd7c69dc1491f6132919237426b445718dffeec786655ab3a20c3fc049064bf5071c485e2

    • SSDEEP

      1572864:w2GKlEWjAOkiqOv8im2AzJE7Bbli0aVrwO:wnKa9OknOv8i3mSw0apw

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks