Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Ратка.exe
-
Size
67KB
-
Sample
250311-m6xfxa1jw6
-
MD5
90c1fd3249cbb92929d26ac792b1cc29
-
SHA1
16514ba032ca6268bdb670c6f3d9a133c8879c99
-
SHA256
fc374086d2937728fb9bfd1e84f4e17fe443af03f5354904d394033459f5d3ad
-
SHA512
8a41f65e141a77c3235a2c0cec1e02e99ea67e6c58e4d283008d7884422f253cefc97fd8f0dd2a4aac4be08357ee05d891043b328037754edf4f1dc4a6d70aac
-
SSDEEP
1536:r9DZVIk78bb/+7A+55U1RO+bQ08SzP/6x+BgbOPQQWrZ9:BDLIk7ubKRWQ+bQAK+BgbOPQNX
Malware Config
Extracted
xworm
means-meta.gl.at.ply.gg:52604
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7389617975:AAFNBkW6gfsAxHeXuCSCpKK2LqIKysVo-aw/sendMessage?chat_id=6968388729
Extracted
gurcu
https://api.telegram.org/bot7389617975:AAFNBkW6gfsAxHeXuCSCpKK2LqIKysVo-aw/sendMessage?chat_id=6968388729
Targets
-
-
Target
Ратка.exe
-
Size
67KB
-
MD5
90c1fd3249cbb92929d26ac792b1cc29
-
SHA1
16514ba032ca6268bdb670c6f3d9a133c8879c99
-
SHA256
fc374086d2937728fb9bfd1e84f4e17fe443af03f5354904d394033459f5d3ad
-
SHA512
8a41f65e141a77c3235a2c0cec1e02e99ea67e6c58e4d283008d7884422f253cefc97fd8f0dd2a4aac4be08357ee05d891043b328037754edf4f1dc4a6d70aac
-
SSDEEP
1536:r9DZVIk78bb/+7A+55U1RO+bQ08SzP/6x+BgbOPQQWrZ9:BDLIk7ubKRWQ+bQAK+BgbOPQNX
-
Detect Umbral payload
-
Detect Xworm Payload
-
Gurcu family
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1