Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
912cb836caee6748788b60d0e26a2fed0dd6ab86fdc347062cf667d6498fa8e4
-
Size
1.0MB
-
Sample
250309-knknaazj19
-
MD5
e08608283c665cc306cc11dcb7c08611
-
SHA1
28f33902c9773764d0c95a85ab204b1b77e18df6
-
SHA256
912cb836caee6748788b60d0e26a2fed0dd6ab86fdc347062cf667d6498fa8e4
-
SHA512
dc716cb9c2b86eff708d11915ccb1c0ce845dab43e1616b28791af6cdab69416ac74a08f352f52ef68d57f84d5fb9ae2bc41c52c6bec3313d2f76fc3bfd5017d
-
SSDEEP
24576:mAkK+owDc5adDtg0W6H8tDPq5hmLQF9Ijr3WVsUaiacf:pHbwDcctdn8tDPq5cLishviacf
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_PO_783B65/RFQ-PO783B65.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ_PO_783B65/RFQ-PO783B65.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
RFQ_PO_783B65/RFQ-PO783B65.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
RFQ_PO_783B65/RFQ-PO783B65.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
204.10.161.147:4955
mzsualcjlq
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
RFQ_PO_783B65/RFQ-PO783B65.bat
-
Size
45B
-
MD5
c15f0bc7c754ae5cc5f09d4a646232a5
-
SHA1
3463cfed84c507ea4839793db9a19b79d9218632
-
SHA256
1d25f7af62786393a933913bcbd4e0412b7261817ecea3aeb60e2294adaece9d
-
SHA512
bf5c3da788c3807d8be313765f12671cc67bac797214d7a18ab1570c6fbcbb4a8536ec169633329d51d22b087692ebfed45fd8565277a4c26df656ab6e9e43f0
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Venomrat family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
RFQ_PO_783B65/RFQ-PO783B65.png
-
Size
1.1MB
-
MD5
c655f74a0a364d39ca8c4c7f46647a15
-
SHA1
04fa23d7ff51f5b503c991f7d9ff0d4c919b89b0
-
SHA256
6ff96de44e65161cfb8afd5e46e30b4940be0187b0c5422ff270f4e5adfb60a7
-
SHA512
120b10adc8b83feeaf26663f954ecba4e06dd6a3100f1d0405e5c054f62441ea9ad92015a296e9d56f9a295b11dbb54e5bcfddd26958a0dcc1633126c2f9a09e
-
SSDEEP
24576:mKyowlc5WdDtWmW6/2t1tm5JcL8FPujl3mV0UKAaL:93wlcctTf2t1tm56LG4LFAa
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Venomrat family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1