Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    run.ps1

  • Size

    50B

  • Sample

    250308-2rsazatvbw

  • MD5

    a842bb38fa14cb90a9a3169e0da00d0e

  • SHA1

    d8541bd2cfb386294b24c4c4e68eba269cbffcd9

  • SHA256

    79a0a92cd82c5a3b0d3e8c72d1acbec46ac9677797cf751584ef5fb838e5b0ec

  • SHA512

    a068a2d4945f38fdd4165089679593b60bc594bb993c0c61f3c08b6b9496f695d847f7f970793a46eaf33ffe80fd93cc3dbee889f471368b6c8bac36a0df9048

Malware Config

Extracted

Family

xworm

C2

running-boating.gl.at.ply.gg:49261

Mutex

nTuejMBVrsDVuX5I

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      run.ps1

    • Size

      50B

    • MD5

      a842bb38fa14cb90a9a3169e0da00d0e

    • SHA1

      d8541bd2cfb386294b24c4c4e68eba269cbffcd9

    • SHA256

      79a0a92cd82c5a3b0d3e8c72d1acbec46ac9677797cf751584ef5fb838e5b0ec

    • SHA512

      a068a2d4945f38fdd4165089679593b60bc594bb993c0c61f3c08b6b9496f695d847f7f970793a46eaf33ffe80fd93cc3dbee889f471368b6c8bac36a0df9048

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks