Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
bluestealer.rar
-
Size
5.6MB
-
Sample
250312-1dmynatxey
-
MD5
a90f4f14fd13ca22cfeb32127493bb3c
-
SHA1
680a9f3b7d74575cdd91f461e9e2b47c10e5c79c
-
SHA256
ee66a185008549b9ca0c687a78aa6a69e4770dd12cab9dc63d5346c1f570904b
-
SHA512
69fee2468fdb90e4dfebe18dd90f040be372a8d7c35f049d1f594c4f6ec37a7bb9fb8f2c847114e315b214e823d3921d4260b3770628903a875a8b9fbb270a66
-
SSDEEP
98304:xIb3rOEojkouUyLJ/IIDwOMTwKoD+ORWkt78cZfHKDDFaWI5Sz3ptM9b3Pd4g6wx:izaEJvD0WD+OP8QfqmSz3pt2zV4g6SmC
Static task
static1
Behavioral task
behavioral1
Sample
bluestealer.rar
Resource
win11-20250217-en
Malware Config
Extracted
redline
@Baobabss
185.230.143.48:14462
Extracted
redline
@tupa187
185.230.143.48:14462
Extracted
formbook
4.1
o4ms
fishingboatpub.com
trebor72.com
qualitycleanaustralia.com
amphilykenyx.com
jayte90.net
alveegrace.com
le-fleursoleil.com
volumoffer.com
businessbookwriters.com
alpin-art.com
firsttastetogo.com
catofc.com
ref-290.com
sbo2008.com
fortlauderdaleelevators.com
shanghaiyalian.com
majestybags.com
afcerd.com
myceliated.com
ls0a.com
chautauquapistolpermit.com
cq1937.com
riafellowship.com
sjzlyk120.com
onlinerebatemall.com
bjlmzmd.com
services-neetflix-info.info
khaapa.com
thehgboutique.com
iconndigital.com
ninjavendas.com
zeonyej.icu
iddqdtrk.com
taoy360.info
conanagent.icu
mobileflirting.online
lorrainelevis.com
bakerrepublic.com
tfi50.net
mildlobr.com
turnkeypet.com
instarmall.com
contilnetnoticias.website
symbiocrm.com
earn074.com
swapf.com
daveydavisphotography.com
notes2nobody.com
pensje.net
nanoplastiakopoma.com
inlandempiresublease.com
donaldjtryump.com
secondinningseva.com
zumohub.xyz
torbiedesigns.com
koastedco.com
lifestyleeve.com
purposepalacevenue.com
risk-managements.com
doluhediye.com
revolutionarylightworkers.com
smithridge.net
share-store.net
jastalks.com
nocodehost.com
Extracted
asyncrat
4.0.0.0
Default
2.56.59.227:8081
2.56.59.227:8082
2.56.59.227:8083
Mutex_21687213
-
delay
5
-
install
false
-
install_file
example.exe
-
install_folder
%AppData%
Extracted
agenttesla
Protocol: smtp- Host:
smtp.boydsteamships.com - Port:
587 - Username:
[email protected] - Password:
co*tNjEBt4
Extracted
xloader
2.5
mjyv
wenyuexuan.com
tropicaldepression.info
healthylifefit.com
reemletenleafy.com
jmrrve.com
mabduh.com
esomvw.com
selfcaresereneneness.com
murdabudz.com
meinemail.online
brandqrcodes.com
live-in-pflege.com
nickrecovery.com
ziototoristorante.com
chatcure.com
corlora.com
localagentlab.com
yogo7.net
krveop.com
heianswer.xyz
idproslot.xyz
anielleharris.com
lebonaharchitects.com
chilestew.com
ventasdecasasylotes.xyz
welcome-sber.store
ahmedintisher.com
pastlinks.com
productprinting.online
babybox.media
volteraenergy.net
chinatowndeliver.com
behiscalm.com
totalselfconfidence.net
single-on-purpose.com
miyonbuilding.com
medicalmanagementinc.info
bellaalubo.com
dubaibiologicdentist.com
jspagnier-graveur.com
deskbk.com
thehauntdepot.com
5fbuy.com
calmingscience.com
luvnecklace.com
noun-bug.com
mysenarai.com
socialmediaplugin.com
livinglovinglincoln.com
vaxfreeschool.com
bjjinmei.com
p60p.com
upgradepklohb.xyz
georges-lego.com
lkkogltoyof4.xyz
fryhealty.com
peacetransformationpath.com
lightfootsteps.com
recreativemysteriousgift.com
luminoza.website
mccorklehometeam.com
car-insurance-rates-x2.info
serpasboutiquedecarnes.com
1971event.com
simpeltattofor.men
Extracted
redline
@l_Like_a_Sir_l
185.230.143.48:14462
Extracted
asyncrat
0.5.7B
Default
iphy.strangled.net:1604
gpmaw.duckdns.org:3040
gpmaw.duckdns.org:2020
gpmaw.duckdns.org:4040
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
redline
@chucoed
185.230.143.48:14462
Extracted
revengerat
NyanCatRevenge
hpdndbnb.duckdns.org:2404
90a49aa7c27647e
Extracted
azorult
https://guifenergy.co.ke/bin/32/index.php
Extracted
xloader
2.5
qs23
alimentosafc.com
noveltyporpak.xyz
fleteszoom.com
crabcompanions.com
metumuskfinance.com
perfectwatch.store
thweddingstory.com
ameliasongsforever.com
enowrecords.com
mywebcrown.com
silianceconseil.com
moodoven.com
generalwholesalestore.com
laguiza.com
gionakpil.com
nftfreemarket.com
astrainconsultora.com
favoritepedia.com
mycprguru.com
estateadmin.services
licensedbenefitscenter.com
z7ips4jnhi.com
thefamilysmatterlawfirm.com
charronteam.com
sapphiremodule.com
carcharginginstaller.com
pledgenwork.com
glasscityrentals.com
lihsin.com
putaojiau.com
justnft.xyz
choiceandpossibilities.com
stark.agency
theandrewjbrady.com
cheaterbnuahe.xyz
ayf1236.com
techvirtys.xyz
simsheating.com
blendeqes.com
nashvillehomesell.com
christialana.com
vvp-bij.info
legalcoloradosprings.com
thanhstudiowedding.com
sogginesses.info
babadebabajiaoshimo11.xyz
bittywire.com
suothernprop.net
palisadestahoeoutlook.com
competitionproduct.com
cateringpairs.com
privatejetsthai.com
motodevi.com
tunaudc.com
disconnect.travel
sjwholesale.biz
roofingslobyo.xyz
doskonale-samopoczucie.com
dazzledayspa.com
riwaq-international.com
2cute2care.com
borzv.com
geraldkbell.store
xsqj888.com
thanhnguyenedu.com
Targets
-
-
Target
bluestealer.rar
-
Size
5.6MB
-
MD5
a90f4f14fd13ca22cfeb32127493bb3c
-
SHA1
680a9f3b7d74575cdd91f461e9e2b47c10e5c79c
-
SHA256
ee66a185008549b9ca0c687a78aa6a69e4770dd12cab9dc63d5346c1f570904b
-
SHA512
69fee2468fdb90e4dfebe18dd90f040be372a8d7c35f049d1f594c4f6ec37a7bb9fb8f2c847114e315b214e823d3921d4260b3770628903a875a8b9fbb270a66
-
SSDEEP
98304:xIb3rOEojkouUyLJ/IIDwOMTwKoD+ORWkt78cZfHKDDFaWI5Sz3ptM9b3Pd4g6wx:izaEJvD0WD+OP8QfqmSz3pt2zV4g6SmC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Asyncrat family
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Formbook family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Revengerat family
-
SectopRAT payload
-
Sectoprat family
-
Snake Keylogger payload
-
Snakekeylogger family
-
Xloader family
-
AgentTesla payload
-
Async RAT payload
-
Formbook payload
-
Xloader payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3