Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3libcares-2.dll
windows7-x64
1libcares-2.dll
windows10-2004-x64
10msvcp290.dll
windows7-x64
1msvcp290.dll
windows10-2004-x64
1nasrallah_x86.dll
windows7-x64
1nasrallah_x86.dll
windows10-2004-x64
1newpoveno.exe
windows7-x64
10newpoveno.exe
windows10-2004-x64
10vcruntime210.dll
windows7-x64
1vcruntime210.dll
windows10-2004-x64
1General
-
Target
newpoveno.zip
-
Size
4.6MB
-
Sample
250313-pav93svmv5
-
MD5
b04c18f34a6cd916f2feddfeb664e4ce
-
SHA1
88d9bcffe4ae28aa9fa42d23d9bf82b5458a506c
-
SHA256
a8f718d94fa718621d41ec3bf5e5361530a101b7f5e75b86226efb2f81f7f715
-
SHA512
5b206f032b3dd7a74487267120df6101c4c251b5c30d0b3bba9af362e5b058bcf15d1703fe0b41172ffca1b59b43be4937e0bfcb7051ff6958f4320a73ec58e8
-
SSDEEP
98304:HHDbgiITR3ISts7WMvrp5kkIugsv78ckP41rMVeGgRq7CfQh1:nPT8tOW0dn8cJ10eDqCfQT
Static task
static1
Behavioral task
behavioral1
Sample
libcares-2.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
libcares-2.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
msvcp290.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
msvcp290.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
nasrallah_x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
nasrallah_x86.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
newpoveno.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
newpoveno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
vcruntime210.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
vcruntime210.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
176.65.142.74:4449
176.65.142.74:4448
daqyvsbasipyrpcr
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
libcares-2.dll
-
Size
6.3MB
-
MD5
76bcdab7c2b6db80c8cb45674ff32512
-
SHA1
3d2d0a6f149af01cefe8dd58532307ebfd9b40e1
-
SHA256
d82b7ed6a1ffcfb6a6e9eb76526d2de18a40ddbff43f08588b581b2d823444e5
-
SHA512
68bdfcf5b5239d074db77cf5723d54f4a2d8af1c719c11ea1989698aef1240b1ea1f49db45bfabf02818d675ac3be7621da569771076a3bad3ac6072bd56afd0
-
SSDEEP
49152:mAs1laV6XyvSVdbh9WNeliu06rfeYRhKA8Uhf8NqiwMAeDAwFrO12RuImEialjEj:aEk7rRJ/kFD7FhQRm/TerPmY
-
Asyncrat family
-
Venomrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-
-
-
Target
msvcp290.dll
-
Size
3.6MB
-
MD5
79203b0cf84b081bfd2f18584f7b9b5d
-
SHA1
bed6f8efdda65ea6cb6092e678fc3c3537c28184
-
SHA256
51a22c1db572ba085de83d265bfeb739dbd863aa9f32d1045716c3b1e641b0fe
-
SHA512
70a4803feaa82d45e8af2277451b888523ef995709c452b8208b36b4ecdf1dab20b8365fe86fca835e79e819178f65fe155af3cbb4432720b01a0382a7f33456
-
SSDEEP
49152:I2PofN7URTVdmEvRAN/P26weoKLlAEegFfZ+x+y:J3d427Ykg
Score1/10 -
-
-
Target
nasrallah_x86.dll
-
Size
172KB
-
MD5
70ec8ee1fad4a9c57b532179aeefce02
-
SHA1
3ee72e32002e813179960154fc7b7b948b54d8c9
-
SHA256
7e3b7ead509960c884e2e870879f7ef73894a746a989694f10318396614952e6
-
SHA512
aebbe72804ec173333d9c9d872ce03a7b29479018da40d5b005a7a1ee563d0915f3059222f75068572af8b749db92fea4d17f4b020a88e49ab87a5151a1f630b
-
SSDEEP
3072:cUxcx4GfSPMV7e9VdQsH1bfgMMARQRM+lmsolAIrRuw+mqv9j1MWLQfBY:c5fSPMV7aesVbYMMARB+lDAAy
Score1/10 -
-
-
Target
newpoveno.exe
-
Size
81KB
-
MD5
41c2401a4ecf9c80796e534d388e56cd
-
SHA1
e844e6b178ef8191ce189c0e632dc7fdb2947db3
-
SHA256
0e5a768a611a4d0ed7cb984b2ee790ad419c6ce0be68c341a2d4f64c531d8122
-
SHA512
6f7d365f10b45cc88d8968020f6232974398cc1b46710bf650c5aa162c40d48fef0a035b29fc1b0271d4f69410fbca1b4a4119d816eeec205043175981429071
-
SSDEEP
1536:dEV+sOWSnk3uXcieWN8WBnc1br8zlZAHaG8CaWCMp+O7Xg5U:dEV+sFSkMxRnc1br8j0aCCMXL7
-
Asyncrat family
-
Venomrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
vcruntime210.dll
-
Size
5KB
-
MD5
603302535c29680945956908637ad226
-
SHA1
6c367b57ea90f53b70aed4edc8c30b5895b2e4df
-
SHA256
cec538bba50466147539fa47b4febd441a799998dd79a3582530e6dcd6414336
-
SHA512
c067e4ae1dc6dd04e7afc0850d50077e3e76dfe79621662e4c8e4e5aea2a032a4bcd86b5e79f8a1185d1d4f1aba65c2fc4fb7e18e4a80c2c0d9944c375139705
-
SSDEEP
96:qroyPYN/tWgSejT+L5pvEB1is8Zgy16cYUYeungdMWf4nm1csMaj7A3i412:py6tgiVBQJZgG68unIf4mCza3eiX
Score1/10 -