Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7Bltools 2....FS.dll
windows7-x64
1Bltools 2....FS.dll
windows10-2004-x64
1Bltools 2....O].exe
windows7-x64
10Bltools 2....O].exe
windows10-2004-x64
10Bltools 2.....2.exe
windows7-x64
9Bltools 2.....2.exe
windows10-2004-x64
9Bltools 2....et.dll
windows7-x64
1Bltools 2....et.dll
windows10-2004-x64
1Bltools 2....se.dll
windows7-x64
1Bltools 2....se.dll
windows10-2004-x64
1Bltools 2....rs.dll
windows7-x64
1Bltools 2....rs.dll
windows10-2004-x64
1Bltools 2....pf.dll
windows7-x64
1Bltools 2....pf.dll
windows10-2004-x64
1Bltools 2....rs.dll
windows7-x64
1Bltools 2....rs.dll
windows10-2004-x64
1Bltools 2....pf.dll
windows7-x64
1Bltools 2....pf.dll
windows10-2004-x64
1General
-
Target
BLtools-v2.9.1-Pro-BLtools2.9.1Pro.zip
-
Size
21.0MB
-
Sample
250226-23cpnawwfw
-
MD5
99b64aac30a9cfa780eda9c5da5df220
-
SHA1
eccf241f53490535d7dab254c272d155506eaaf4
-
SHA256
912a8bf9175eb19e46272ad9a49a14e192e936df2e2801038778aa58c00de723
-
SHA512
60cd6d16ae52670c818ebfd20fe4e90c1d1d347bde3e35fa8a1c18a9f1c3d08536ba99da87cabf42d75bb4ef838f0719a5eeeed64673561205589451b5aa8f08
-
SSDEEP
393216:ZDD+tkooF69/sW4n5kbmNsUP+c+ZfhrWOjlTBSAI2tAVZVJNIo6mTjW8r5sNR:lCtk9SEVQmyG+nZfhKOJ4AjIHzV/nNsv
Behavioral task
behavioral1
Sample
Bltools 2.9.1[PRO]/AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bltools 2.9.1[PRO]/AlphaFS.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Bltools 2.9.1[PRO]/Bltools 2.9.1 [PRO].exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Bltools 2.9.1[PRO]/Bltools 2.9.1 [PRO].exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Bltools 2.9.1[PRO]/CookiesCreator v1.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Bltools 2.9.1[PRO]/CookiesCreator v1.2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Bltools 2.9.1[PRO]/Extreme.Net.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
Bltools 2.9.1[PRO]/Extreme.Net.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Bltools 2.9.1[PRO]/License.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Bltools 2.9.1[PRO]/License.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Bltools 2.9.1[PRO]/MaterialDesignColors.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Bltools 2.9.1[PRO]/MaterialDesignColors.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Bltools 2.9.1[PRO]/MaterialDesignThemes.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Bltools 2.9.1[PRO]/MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Bltools 2.9.1[PRO]/Microsoft.Xaml.Behaviors.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Bltools 2.9.1[PRO]/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Bltools 2.9.1[PRO]/Ookii.Dialogs.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Bltools 2.9.1[PRO]/Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Bltools 2.9.1[PRO]/AlphaFS.dll
-
Size
359KB
-
MD5
f2f6f6798d306d6d7df4267434b5c5f9
-
SHA1
23be62c4f33fc89563defa20e43453b7cdfc9d28
-
SHA256
837f2ceab6bbd9bc4bf076f1cb90b3158191888c3055dd2b78a1e23f1c3aafdd
-
SHA512
1f0c52e1d6e27382599c91ebd5e58df387c6f759d755533e36688b402417101c0eb1d6812e523d23048e0d03548fd0985a3fd7f96c66625c6299b1537c872211
-
SSDEEP
6144:QDyJst+jyCnzLp9hvHsPvPvPvS2JQvlojidPp:QDyJsvCnzZf4U1d
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/Bltools 2.9.1 [PRO].exe
-
Size
14.0MB
-
MD5
59fa48be8a4b93d5b6264b3f30a42c57
-
SHA1
35af02f02568cf21d954a79972a3e1b9a88c14c1
-
SHA256
0a602136ae066c54d87a8d275fab10d34df115b49a3ea580b8c825a6c637a669
-
SHA512
4ae4485a3daae4cfb703b46ef76b1f9979bdef8e9b21d7d8527a5dd73d88e34c36ec7d08230469cd98981a15ad72104d98acd5ed64ca906282770b141d406065
-
SSDEEP
393216:jehC8odGNhEge3fk76ni3DuAOTFbXkO/14:yhC9QOp06izuHTFb0O94
-
Detects Monster Stealer.
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Monster family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Bltools 2.9.1[PRO]/CookiesCreator v1.2.exe
-
Size
3.3MB
-
MD5
30c33f45545b68bd1e0d7ec79a090883
-
SHA1
086e1fadee4a61091250dedb616785c73b50950c
-
SHA256
4e95226cce6e17fdc39f3a5f9050720d7848bb34ce2df72e63c878235c5be630
-
SHA512
d76e6d64147d185a07b819cc9fe26daa1c1ae72af6a01b5467ae0b7f07239a8c0edc0c9066fff22c08241025909b492af9cc1f4e3d0eb136a54ee3b7a0d5a6f4
-
SSDEEP
49152:14AQHxRXGKijAKG+TAdrdBpNIty0YwIs349UnzIYua0+v8li9IiFqVsf/z452nZ5:1lAnrVKGNhdBEIs3IuUw085qKf/z45
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Bltools 2.9.1[PRO]/Extreme.Net.dll
-
Size
121KB
-
MD5
f79f0e3a0361cac000e2d3553753cd68
-
SHA1
4314bcef76fddc9379a8f3a266b37d685d0adb79
-
SHA256
8a6518ab7419fbec3ac9875baa3afb410ad1398c7aa622a09cd9084ec6cadfcd
-
SHA512
c77516e7f5540ecd13fa5d8cecfce34629acecd9b5a445f5f48902c9e823328fa9a6694ecaa39f5b6053de61c2b850c2d87df25357548afaad6ec37eb3e5e355
-
SSDEEP
3072:bdoECIgjBibgp2tBqL0Y++ruXqMG4ih3lbpMqc:bdoECIgUrG
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/License.dll
-
Size
11B
-
MD5
d76bf73f3d3768a4589e72a7b2b83088
-
SHA1
9e6d246ddb9ae2438fcc1d12534e54c84bc38382
-
SHA256
eaab53f4b23c3cc9e3c9d4d5d4689438146519e69c7063f4f15b0a43dd861f7b
-
SHA512
519e9210e9d751a524cf49ceff2e7ddd096f679760a0807d9ee6a3f0870d418336d5004bfd54b94a749f17f3ba85dc404d2cc700fdb3bee1610aba727d428eaf
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/MaterialDesignColors.dll
-
Size
295KB
-
MD5
5c108c4da6d03f0fa2c3b4dc7890cb52
-
SHA1
48af67b6166068b6f138306bbd1157c7583c6e73
-
SHA256
b5ec30c93b1d2b4631ee2b178750ec92e302e2e331090ec9783981b9572354f8
-
SHA512
48d055610eead361809bd839c66ccdca1d5e0d9dffe15af9d15afa106ee7791c8b17acb91f2aba5cf3dda2997b049bcf70b43c3b56b8b01f1fc7bb845ce6c91b
-
SSDEEP
1536:wr1In+fq1fDfDemxD0EsXpGX0EOAcTtU7fKoVxbzQcV:G1WB1PerAjOAj7fKoVxb1V
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/MaterialDesignThemes.Wpf.dll
-
Size
9.1MB
-
MD5
824cbf63999f954aa1747f79586a4d3c
-
SHA1
5f1cd6346a45024bbbe09e304c12b6f6bf227d5c
-
SHA256
344e2cee979e979932f504dc76bd75e97ae1ff46caa3fe2795adfe0a866347f7
-
SHA512
d36149f7cb5ffc62dac6bb4521105d09fac988de567e181fdca4f23e5079aca5f4292e1d314f797f1a597263ddac0210060cb71c111565717e3a288a47770c51
-
SSDEEP
98304:PW8EOPXJDntBksKY+ND3WyA4+TLVei10vMzPv8/4C8B5XVS49Xzy83IiEcJMrCRM:PW8lnJ45/9iD54+V11bFv4z
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/Microsoft.Xaml.Behaviors.dll
-
Size
142KB
-
MD5
95f46f34c099421d917d5feadbb33edb
-
SHA1
3d1cb9cf59000012734901a35baeb3d9c1dd5db3
-
SHA256
8e77a1dd5e2df4d4af801376cc3428b082eb49fcb6e647b933967fae12ad9d5d
-
SHA512
c9c9f72980316c68ad2a8dbe2c6c563c0deddfc9e845674d0e2f5313a0ae285d60a755e2ca04164f78b37a36521259307b3eb7d43f5ec9a9de5507bda7e4c1b8
-
SSDEEP
3072:lN+EM1X0WlL9JAn11M1dXcGkOsizI35rCj8SIP:v+ll79in1h6
Score1/10 -
-
-
Target
Bltools 2.9.1[PRO]/Ookii.Dialogs.Wpf.dll
-
Size
103KB
-
MD5
932ebb3f9e7113071c6a17818342b7cc
-
SHA1
9ce2d08bc3840632092325abcc8d842eeb8189d4
-
SHA256
285aa8225732ddbcf211b1158bd6cff8bf3acbeeab69617f4be85862b7105ab5
-
SHA512
6b6086cff7b916c0c4536e3c7cba4ba17d6c4be2e4a88a5877be852e197f1f9c9c120d1295acf2b4277a9badd8cfd229ef3c1ab2049d0aeec22d3033be156141
-
SSDEEP
1536:qgoPBGuyAy52V+gtTLq6ZUc68h8O0SB/XBboIawHUPV5bKLh8sm6b0gl:qgwBGu2IV+ghd68WOxXBbx+5of
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
3System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
1