Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
cfed7abc2cdce41348af42dd516e8731d4de0ceaa14c6c3a0e48ebd539e22559
-
Size
83KB
-
Sample
250311-fwpjzsttf1
-
MD5
4e969a3e3014194ed6e33f384fe3394c
-
SHA1
3209f7973906286f182dc1574c571356834c2b1c
-
SHA256
cfed7abc2cdce41348af42dd516e8731d4de0ceaa14c6c3a0e48ebd539e22559
-
SHA512
ca88c9a6b493b658498de783d1b95cabbf8d7fd49c06636adb33c66a7bd861ea310c5484d92c293a75025b21e528b3581f170691c070161e40a0e51a48339501
-
SSDEEP
1536:nQgUoFley2HuI4eB7qsd1yre4zm4miCRv4KCrVFxOJ4rw4XKpf:mElKxd8rhzqiAw4Jzpf
Behavioral task
behavioral1
Sample
cfed7abc2cdce41348af42dd516e8731d4de0ceaa14c6c3a0e48ebd539e22559.exe
Resource
win7-20240903-en
Malware Config
Extracted
gh0strat
host123.zz.am:6658
http://23.104.160.115:8890/version.php
http://23.104.160.116:9963/
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Targets
-
-
Target
cfed7abc2cdce41348af42dd516e8731d4de0ceaa14c6c3a0e48ebd539e22559
-
Size
83KB
-
MD5
4e969a3e3014194ed6e33f384fe3394c
-
SHA1
3209f7973906286f182dc1574c571356834c2b1c
-
SHA256
cfed7abc2cdce41348af42dd516e8731d4de0ceaa14c6c3a0e48ebd539e22559
-
SHA512
ca88c9a6b493b658498de783d1b95cabbf8d7fd49c06636adb33c66a7bd861ea310c5484d92c293a75025b21e528b3581f170691c070161e40a0e51a48339501
-
SSDEEP
1536:nQgUoFley2HuI4eB7qsd1yre4zm4miCRv4KCrVFxOJ4rw4XKpf:mElKxd8rhzqiAw4Jzpf
-
Gh0strat family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1