Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    WinWord.ex

  • Size

    6.9MB

  • Sample

    250226-wnjxjaxza1

  • MD5

    389390bf696737deedaaf10a90d407d1

  • SHA1

    87758da2fe832f302032e904eb13994c70023825

  • SHA256

    d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734

  • SHA512

    4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0

  • SSDEEP

    196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1038709348303650857/DLQdA51dlH2mWOgr-jjNC0jvu25-oWapgKwxpsqsFwOSYLm4gQOEdFE6XXg7_sReK0AB

Targets

    • Target

      WinWord.ex

    • Size

      6.9MB

    • MD5

      389390bf696737deedaaf10a90d407d1

    • SHA1

      87758da2fe832f302032e904eb13994c70023825

    • SHA256

      d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734

    • SHA512

      4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0

    • SSDEEP

      196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD

    • DarkTrack

      DarkTrack is a remote administration tool written in delphi.

    • DarkTrack payload

    • Darktrack family

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Modifies file permissions

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks