Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
infected.zip
-
Size
305B
-
Sample
250220-w7h5casja1
-
MD5
2f924641c603cebaf3643254c0f5fb0c
-
SHA1
3987572548b2cf9011f7b37c18bfa6a37921c112
-
SHA256
e865c11a09f20f23f2e4db2f432bae3d9c504e76f4c6211a761152bb8e58c2ba
-
SHA512
38ddaafa6ca34d60dfb1923e69a997995582f67bb08d604549e3872391c1d3d32e12c1e9a32b5498817f9b50f7e8aae25bc8e5695ddf7211a0f848ffb26f17d6
Static task
static1
Behavioral task
behavioral1
Sample
tax.url
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
62.60.190.196:8000
9Kl9naWliCNlyild
-
install_file
USB.exe
Extracted
asyncrat
Default
62.60.190.196:3232
62.60.190.141:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
62.60.190.141:4056
fagpetngyrfkiki
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
tax.url
-
Size
164B
-
MD5
723aac9b3e0f882ec7b82dff9baddcf5
-
SHA1
52b2dc535388d53584d2d71ab07a81c07b9ed88e
-
SHA256
66144c2c65f050cb23aae78416d596aa411aea6bdaec123b998061b9059661b9
-
SHA512
db169bcf3ee28196ac7a02024aaf15419036f305a84a8581297a4df3736b6af6536e98ec64e17ab2b6149eb062a181505afade4a78c3b30b629d92c3d3a85760
-
Asyncrat family
-
Detect Xworm Payload
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-