Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10cdnmain/Exela.exe
windows10-ltsc 2021-x64
10cdnmain/Exela.exe
windows11-21h2-x64
10Stub.pyc
windows10-ltsc 2021-x64
3Stub.pyc
windows11-21h2-x64
3cdnmain/chrome.exe
windows10-ltsc 2021-x64
10cdnmain/chrome.exe
windows11-21h2-x64
10cdnmain/cl...st.exe
windows10-ltsc 2021-x64
1cdnmain/cl...st.exe
windows11-21h2-x64
1cdnmain/ef.exe
windows10-ltsc 2021-x64
10cdnmain/ef.exe
windows11-21h2-x64
10cdnmain/libsodium.dll
windows10-ltsc 2021-x64
1cdnmain/libsodium.dll
windows11-21h2-x64
1cdnmain/sqlite3.dll
windows10-ltsc 2021-x64
1cdnmain/sqlite3.dll
windows11-21h2-x64
1cdnmain/vc...40.dll
windows10-ltsc 2021-x64
1cdnmain/vc...40.dll
windows11-21h2-x64
1cdnmain/verif.exe
windows10-ltsc 2021-x64
1cdnmain/verif.exe
windows11-21h2-x64
1General
-
Target
archive.rar
-
Size
11.6MB
-
Sample
250310-vhtzwastaz
-
MD5
88f853c79f8978c740a39b6ffeafdde3
-
SHA1
2f142b3c96ef3b8d6b7705055a504fd0d4ed66a1
-
SHA256
1ab7fef81e4a5325f70a7eb8f1e551edaa6344d16eb1aeca68974d89bb4e40db
-
SHA512
fb3fc9b6b1e35dc812b2e328c46e177da57649be2679f02fc02addcf1f552aeb2dac5f900b4eb0cfbdfba2c8c378ba340882f9b32a016caedbc87b6c594dce8c
-
SSDEEP
196608:/q710W0isAdLeCKHnNUdTp5S4OhUIyFaEkFNEDMYaHUgRhBJwYpSOc0VsG:AfdyTHN6pdZIyIXGDMN3jTprZ
Behavioral task
behavioral1
Sample
cdnmain/Exela.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
cdnmain/Exela.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
cdnmain/chrome.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
cdnmain/chrome.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
cdnmain/ef.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
cdnmain/ef.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
cdnmain/libsodium.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
cdnmain/libsodium.dll
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
cdnmain/sqlite3.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
cdnmain/sqlite3.dll
Resource
win11-20250218-en
Behavioral task
behavioral15
Sample
cdnmain/vcruntime140.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral16
Sample
cdnmain/vcruntime140.dll
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
cdnmain/verif.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral18
Sample
cdnmain/verif.exe
Resource
win11-20250217-en
Malware Config
Extracted
asyncrat
1.0.7
Default
2.58.56.179:2035
r4ttlesn4ke_ufog3f8u3egef978
-
delay
1
-
install
true
-
install_file
Chrome.exe
-
install_folder
%AppData%
Targets
-
-
Target
cdnmain/Exela.exe
-
Size
10.7MB
-
MD5
0489da91d3268410bb8d82602e3e8cf0
-
SHA1
005fd8cfce34f5fc1763cc0aa16e59c39384e9c7
-
SHA256
ff34ad9f57f38b0c38847235ba4296f5e75da20cda43355b887ab5ccbaaa2cc7
-
SHA512
23cef165b84a5a105bda73e7c4e123ad4ca55e6f12cb4d4ca520ccb689c9df87a1ab48984b7c139633cbe707c83642701b61535558dccb69e4500d9e506cbc6e
-
SSDEEP
196608:V3irLJJpeXxzO8tknqkPYCHB6y/+KdWhSELyRdKcIr:JUJeXxz5SfHBRtVF9
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
799KB
-
MD5
5605a3e3ebb0727418f44354843c53b8
-
SHA1
991ab1a7950376f27d0e13be4156cdc921d128ea
-
SHA256
71be841e886152241dcd0752b6e72c4e5d177fe649889905cbd51547c0d9e0e2
-
SHA512
3c8b79529c86c74d398be7704282bdbd1f82b9f65b458f16ca9b02a964f830efe8772189c5b4f30c1a4c209a35522eed658af11b60e2857e45c663d3a64053f8
-
SSDEEP
24576:xdUK0BvxxQlxhqVCiLYzYtVGTCyw4Tr2sKT:EhlvQrViVATKT
Score3/10 -
-
-
Target
cdnmain/chrome.exe
-
Size
48KB
-
MD5
560316acf1e4be6ee63f609da37e71b5
-
SHA1
5f22dcf7736356e24b92397162acb723010914fb
-
SHA256
44d97fbdb694ca55e3beec4ec031ef5162018bdbaff6a968ac25a21e078511b0
-
SHA512
38d185d48cf537162ef8302df31cdf723d7407765f21284492345cae914d38ec9e3a6cfee0080b5ff9ebef29f7ac54a505ea2e6fea5d65a60c4e6e1e67fb3361
-
SSDEEP
768:+BUQgNIL4+M0+LiPLKjwiT8Ybrge09FvEgK/Jw8Vc6KN:+B1gjsPLKTzbUxznkJw8VclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
cdnmain/cloudflare_whitelist.exe
-
Size
371KB
-
MD5
413edd6588c2ee8ba41daad8b96e1a76
-
SHA1
a58a01a183af99c57a0019093cd24f2c2a88c222
-
SHA256
5c214b2fbf24154ab23870ffe97b0a31d47b9093e4ad4a003652a62ffafa6a74
-
SHA512
a45c1cc176a6ea535923f478412dd35404877eac815d4471831b8fda2c0d4a699d1e25fc28614e9b63bd8faa09c5ca2c11cc543b0037667a9c97b1fa13b08db8
-
SSDEEP
6144:+29A+Dxtpj5Lsc5lITKPam1HuqqrcAENm2DhPtXlL4CA:U+jpj5Lsc5liKPlHuPcqk1Bl9A
Score1/10 -
-
-
Target
cdnmain/ef.exe
-
Size
54KB
-
MD5
0ed9406036832e40f6ace06478acdf44
-
SHA1
9a3ca883ec34bdfd1c21c61c6ca6d03c5365fa6e
-
SHA256
452e3305df1bf06c79301b9b87de1ec82561a793c4ef4ea5a02803123891b9f6
-
SHA512
9de32c71a4657d3e9ebd01fd1d933fd44b23c99809bbd0c8c423dcf8436d8c3f81e390ec34df8fb2e5a3a28974c864750ceaeb65693c04b1c5a1f8134eca69a5
-
SSDEEP
1536:de/mS9oEXN9p7aNJahXy4zGuH4XlqJaAIT+7bqhyX9qZ:d+mSawsLawqGMolq07i7bqMX9W
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
cdnmain/libsodium.dll
-
Size
341KB
-
MD5
638fdeedeb1dfc9ba4f7c4d7a96b9559
-
SHA1
3ec89ef6cab0904c0f3a0122cf715b7cc2855956
-
SHA256
011e5b5b576fe13b4c11a8358fc81d4c70a6a5163c0be97b4113ffde133cf0cb
-
SHA512
2b31f05ac56d071ba1555d0a387b0fed74341a8a6324ab53ce8a4dfafa1b72e6b2aedb98997c9a7490b9fd072e46ba1e95ae85150c2f1bfdd6882f87e7edc2f8
-
SSDEEP
6144:slXmrwctsNRxhBY36OW16GLAJYDV50DErM5Q0N:gm/t6YqOfoAJJD95
Score1/10 -
-
-
Target
cdnmain/sqlite3.dll
-
Size
1.0MB
-
MD5
abd499b6a9fe8fca0eec593ae58cdc29
-
SHA1
40b6dca224ea6aced518f884612abf71aea769a7
-
SHA256
cc4b95f75d37b642e3bc89e57b50df40519ed9ee7e3b45eb2b061ca6a63b221d
-
SHA512
b5d5b84e16a99824cadcc25649ee39cd0728380adeacb93d75365bf37367002fc741b286754c0c9173a0b27bc8d1d77e2ba7c6979c2592756bec6c08696b1479
-
SSDEEP
24576:ScO/Q+Ph+9Xxh05eUMgNZGUUrH/0TmjpnUVfSz:JYQXVUMubm9UVS
Score1/10 -
-
-
Target
cdnmain/vcruntime140.dll
-
Size
117KB
-
MD5
943fc74c2e39fe803d828ccfa7e62409
-
SHA1
4e55d591111316027ae4402dfdfcf8815d541727
-
SHA256
da72e6677bd1bcd01c453c1998aaa19aeaf6659f4774cf6848409da8232a95b2
-
SHA512
96e9f32e89aee6faea6e5a3edc411f467f13b35ee42dd6f071723daeba57f611dbd4ff2735be26bb94223b5ec4ee1dffedf8dc744b936c32a27d17b471e37dcf
-
SSDEEP
1536:R9TXF5YXWbj8qr51XlN+dULTCe1IGhKWyxLiyaXYaWEoecbdhUoTtHez9FazR:REnsvReGsWyxLizXFCecbd1Tt+i1
Score1/10 -
-
-
Target
cdnmain/verif.exe
-
Size
370KB
-
MD5
f105bc03c77337cc5997829bf5738a20
-
SHA1
a8e71ae8d86c520ebfc6b465078692afc0592e9c
-
SHA256
861f877efa744885c9d19b9de3489ed18b725ab5cf02a73bd3af9d50b950dd7c
-
SHA512
96a539ed4944713b921879c5a0bed1a2f021f4fa0a2b27b52d3c3ae2ae4ed403bf0e2c39fac52445bb530cd093e7262f61ff6edbffe529c554b8e1565d4d70aa
-
SSDEEP
6144:nc5iCjosvwX1+pxU5wl5GzspvblKHf9cFSo4XM:ejrvwX1+HQwlTpvQH1eSX
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
3System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1