Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1027f824a80e...71.exe
windows7-x64
1027f824a80e...71.exe
windows10-2004-x64
102c4115951e...47.exe
windows7-x64
102c4115951e...47.exe
windows10-2004-x64
10500c00d4d7...0a.exe
windows7-x64
1500c00d4d7...0a.exe
windows10-2004-x64
373592f050e...1c.exe
windows7-x64
1073592f050e...1c.exe
windows10-2004-x64
10b086986db5...76.exe
windows7-x64
10b086986db5...76.exe
windows10-2004-x64
10b99dab26a9...fc.exe
windows7-x64
10b99dab26a9...fc.exe
windows10-2004-x64
10c9fc6dc8c8...e6.exe
windows7-x64
10c9fc6dc8c8...e6.exe
windows10-2004-x64
10caf5832156...ad.exe
windows7-x64
10caf5832156...ad.exe
windows10-2004-x64
10cf18bda81a...a2.exe
windows7-x64
10cf18bda81a...a2.exe
windows10-2004-x64
10d1f1126921...3e.exe
windows7-x64
10d1f1126921...3e.exe
windows10-2004-x64
10e329eaa5c0...cd.exe
windows7-x64
10e329eaa5c0...cd.exe
windows10-2004-x64
10eba45a34e3...0b.exe
windows7-x64
10eba45a34e3...0b.exe
windows10-2004-x64
10General
-
Target
bluestealer.7z
-
Size
2.1MB
-
Sample
250306-cx2zxswny8
-
MD5
8688fa67f01c3a05ea5246ea671fa45d
-
SHA1
bd3d0167efac90adddce82c10d679069680eeaeb
-
SHA256
b8a46aa74b7e451ca9ae336258971d7d46334b37c487da00a6039c1d146f6d62
-
SHA512
2a69e6331730c381d8865d5d36948b632ef010be313526b428b77e6b42f21add9b00a5e19c08631a0b0200e2cc7444eba5e5850dc65decc23f94c6168a4abdb1
-
SSDEEP
49152:+5tB7WVB/YgSjcZlNt9pqCiLnLqJiJLKjIbHxATTg5IY9L:+53WjZlLoLqJkLZrx4TBYl
Behavioral task
behavioral1
Sample
27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
quasar
1.3.0.0
Win_Update_2023
butterflybourne.ddns.net:4782
QSR_MUTEX_zD2aPCc6Z0MX6eOBsy
-
encryption_key
JzQzojcImiy4nU59S0ns
-
install_name
custom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Win_Update_2023
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Targets
-
-
Target
27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71.bin
-
Size
1.3MB
-
MD5
2e6372abf5c58a233b273eb612950567
-
SHA1
aed459512d857a0a6248cc9cb5785963a335b47e
-
SHA256
27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71
-
SHA512
ce06d3aa738e8f466c0e2be8cd9e2a79c286f4af4c7ed88da95d8b93bfa998e705eb25b6f5c9ae8d1d11fe4787f0c743edefae985d8756e822b1b003fcd61107
-
SSDEEP
24576:7bx5ACyRtvPExqgcSSu5bqhD92oK8t7yz5b/UXq60Lnyx2M3TttxnvR:vAVRBPhbSFAhcKtYiq60LnKTVnp
Score10/10-
Blustealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647.bin
-
Size
1.3MB
-
MD5
40359b10d6abf5315ad4989515c8cd85
-
SHA1
7ff721bba3042816f6f7fd282c93d270247dd20f
-
SHA256
2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647
-
SHA512
b1583343d928976d222fe9ac9857e2f73f324b853e04be40602db2425c51a56681ad992d1d2adb95da454f5ce5ca1a7731ef0a380d1d84ca5b112fb182145005
-
SSDEEP
24576:7bx5ACyRtvPExqgcSSu5bqhD92oK8t7yz5b/UXq60Lnyx2M3TttxnvZ:vAVRBPhbSFAhcKtYiq60LnKTVnR
Score10/10-
Blustealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a.bin
-
Size
2.0MB
-
MD5
4100474701cdd949eeb746204b304884
-
SHA1
b10084c336561ee34428e6854cd3e55f3739b309
-
SHA256
500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a
-
SHA512
171a71b983e214c7b9b1f714126d4adb8eae37b30daa135ba134c8bc2adf8bb638bf6d6b839d1d27adbdadfc47786265530f44163847edb7d56ec12cc032dd42
-
SSDEEP
24576:BknTbMEnBzUZ+NbQM6YmDKSUlmDaGJTA4Pqa6jUvOkQu:unMEBza+N9aDKLkDl+dUvO
Score3/10 -
-
-
Target
73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c.bin
-
Size
2.0MB
-
MD5
3c63ad1e2e8970c53fbf2be431c7fc36
-
SHA1
87391866f4a2661eb0cb027a9cfeb2d3a7335eca
-
SHA256
73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c
-
SHA512
2aea8b499ace63d12fbd49d92ddb49fcbc9da162116343254d6ff47b2a151c0558afff25a7b5a5f58af3602dfab5890d9fa45554da8eb0d6bab806a334bf7521
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYW:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YE
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176.bin
-
Size
2.0MB
-
MD5
17720d715313d08dc36eb0499424230a
-
SHA1
c3913c55b50c9055625df6d6752be2f272622f1d
-
SHA256
b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176
-
SHA512
fc9a13571cf6e09c335d2a73f2eb11265a4f774dd940eb684faecbaefea3d9398b0d5136b763f210a20a5bdf872e52b8269ae9b89cb01bf392f0296a982d6712
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYb:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YJ
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc.bin
-
Size
365KB
-
MD5
57e44c04fcf797cc96f11a5e539dcf45
-
SHA1
ccb1a5049980889cfe8d96ceba005c536d25e017
-
SHA256
b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc
-
SHA512
9caf54fb294cd085bbd0337d70a9bfc0b11351a9ea46b0a09fc6a5e869bd8b15a6ea514f758aed9169894c82f271611f1ecb10570f99a0b76a79e28b3b462c95
-
SSDEEP
6144:Yx6bPXhLApfpIcE/ckl2La1bz4uUYHD7XKj8lxfBA66Ec2KHv:4mhAp8Bl9N4lkmj8RA6pcL
Score10/10-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
-
-
Target
c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6.bin
-
Size
2.0MB
-
MD5
eb37bef34881d2353e4cb76bfefa7d37
-
SHA1
855dd99b54b63e9372d2d3a2436250d1e1b50739
-
SHA256
c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6
-
SHA512
7e487e5d70af4a57051a0bec77812651a299b0de522f704d4b24dd541f34e46f6393deab4ed63e5d80703c4fa73cdd491dac513c4ca2991db23489c7d704e5e8
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yq
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad.bin
-
Size
2.0MB
-
MD5
a7d2254dd17852abff4794059b2ba5f6
-
SHA1
45ea0c75357b0854dbee73244d1238c14b8c0107
-
SHA256
caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad
-
SHA512
b403f0611c36da0a20313d6d518aa27ca6ac5ce5fc9b34a20fa14c47faa355ade25f952904d4503eedb97aadd9b81e560439a003164c59dc5cee25f8b95a1f6e
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYz:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y5
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2.bin
-
Size
2.0MB
-
MD5
eb5078a37d60f4b968af5955fb31555e
-
SHA1
3e0fccb93c56bed19b6e01ac24d1517b89696efb
-
SHA256
cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2
-
SHA512
574c9a234e316c5576812001e61eb554ab3a42d2663265e35e001f5aaf53f1fd310acd46d453f8e0ddbcaa7ee0424b5c49c8cf29478fcf65e11dbcc6ab6bab23
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY5:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YT
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e.bin
-
Size
2.0MB
-
MD5
3122ecf57731e501138565db5741fe49
-
SHA1
5a41892c9e73afde78510c0426da994d21515e9e
-
SHA256
d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e
-
SHA512
d49434de0cbb63f44bba3e6e57bf7471bc2ce71b6efa81c1bacbf3bcf8e6c4138526c06760cb461b46ccb0b44f2d9e2422bd37352c1f60a952dfbaa6a8be8513
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYY:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yu
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd.bin
-
Size
2.0MB
-
MD5
89bdd75e21e97be92659871ce863eaa3
-
SHA1
795d9044f2ae440e92f21dee42b0ccc884c94fc9
-
SHA256
e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd
-
SHA512
5cb6efc9c022c448cca77f66b12a3ffbecede46cb76815134b87d9c4b7daeb712e7eb9b6f472f5d208b4c51ce4e12b0cd2d0dd5de6e453b16e739a1970f2a1e5
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYM:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Ya
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b.bin
-
Size
2.0MB
-
MD5
7888711f3d11f449955d82d767ee9762
-
SHA1
5fc94a3d3d7aff5884a1732ee796b3f5fdd3364b
-
SHA256
eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b
-
SHA512
40d3b9548fb12f0ff0d035c654349d0e849c9715d81f3ae82909214596461247f5832672c2fc0aff30e9e5d329194c554e433fb8642a68635be78c92b4e9733b
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYf:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yx
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-