Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Ратка.exe

  • Size

    67KB

  • Sample

    250311-m6xfxa1jw6

  • MD5

    90c1fd3249cbb92929d26ac792b1cc29

  • SHA1

    16514ba032ca6268bdb670c6f3d9a133c8879c99

  • SHA256

    fc374086d2937728fb9bfd1e84f4e17fe443af03f5354904d394033459f5d3ad

  • SHA512

    8a41f65e141a77c3235a2c0cec1e02e99ea67e6c58e4d283008d7884422f253cefc97fd8f0dd2a4aac4be08357ee05d891043b328037754edf4f1dc4a6d70aac

  • SSDEEP

    1536:r9DZVIk78bb/+7A+55U1RO+bQ08SzP/6x+BgbOPQQWrZ9:BDLIk7ubKRWQ+bQAK+BgbOPQNX

Malware Config

Extracted

Family

xworm

C2

means-meta.gl.at.ply.gg:52604

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot7389617975:AAFNBkW6gfsAxHeXuCSCpKK2LqIKysVo-aw/sendMessage?chat_id=6968388729

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7389617975:AAFNBkW6gfsAxHeXuCSCpKK2LqIKysVo-aw/sendMessage?chat_id=6968388729

Targets

    • Target

      Ратка.exe

    • Size

      67KB

    • MD5

      90c1fd3249cbb92929d26ac792b1cc29

    • SHA1

      16514ba032ca6268bdb670c6f3d9a133c8879c99

    • SHA256

      fc374086d2937728fb9bfd1e84f4e17fe443af03f5354904d394033459f5d3ad

    • SHA512

      8a41f65e141a77c3235a2c0cec1e02e99ea67e6c58e4d283008d7884422f253cefc97fd8f0dd2a4aac4be08357ee05d891043b328037754edf4f1dc4a6d70aac

    • SSDEEP

      1536:r9DZVIk78bb/+7A+55U1RO+bQ08SzP/6x+BgbOPQQWrZ9:BDLIk7ubKRWQ+bQAK+BgbOPQNX

    • Detect Umbral payload

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.