Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Ghost Executor © 2023.exe

  • Size

    46KB

  • Sample

    250306-2pacdayzbv

  • MD5

    63fbec563805efa7c5e40a5ed3a27bef

  • SHA1

    35eac3050adb6d69ea9563e3a462d97c82da1f4a

  • SHA256

    4474ef7d552cf58312474e62a111f136bfdc503f4d5eeb458fa46b41a71f6459

  • SHA512

    b704586a61c1c9fa362c1271ac9680c37e931a00beb1063e990d4a0e544a47eeb08f4399548009f66ed47e8a89b7082212fc78273dded7675dc5c20d969bd954

  • SSDEEP

    768:N4lrbBafE/p+LP38W0vWL8RUb0vw9MiCB6SJWAA1yZrF:WYfEQ8W0rGIo9LCoEWA4S

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

born-questionnaire.gl.at.ply.gg:44137

Mutex

DaGang

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    SGV4eEFuZE1l

  • reconnect_delay

    4

  • server_signature

    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

Targets

    • Target

      Ghost Executor © 2023.exe

    • Size

      46KB

    • MD5

      63fbec563805efa7c5e40a5ed3a27bef

    • SHA1

      35eac3050adb6d69ea9563e3a462d97c82da1f4a

    • SHA256

      4474ef7d552cf58312474e62a111f136bfdc503f4d5eeb458fa46b41a71f6459

    • SHA512

      b704586a61c1c9fa362c1271ac9680c37e931a00beb1063e990d4a0e544a47eeb08f4399548009f66ed47e8a89b7082212fc78273dded7675dc5c20d969bd954

    • SSDEEP

      768:N4lrbBafE/p+LP38W0vWL8RUb0vw9MiCB6SJWAA1yZrF:WYfEQ8W0rGIo9LCoEWA4S

    • SilverRat

      SilverRat is trojan written in C#.

    • Silverrat family

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks