Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    loader_prod.exe

  • Size

    20.7MB

  • Sample

    250314-1fby6sztfy

  • MD5

    87de1d182d3540a364412dbe8d8e6bba

  • SHA1

    69c9e8ee556f3563668ca17aafb56f2875bcb524

  • SHA256

    60e8bd0c2321279578cf429f2227ffd2fc1ed45f4b8bf9697d755d746f5ba1c4

  • SHA512

    1c88c268bdc9a4b5106e03b90a18dfd8202a3597527bcaab710886e9a922ecac5c3c44af930a57c81a2ad4aa24ec2e28290a5a46244553475335af2a2897f17f

  • SSDEEP

    393216:6WtM3GWaxlJuU/J3xmgiX3292YMJwF+lxismXsOwSUMtfKwQaZ12:71zlJnlxmV3292fSkxismXlpfnQC

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

EulenV3

Mutex

deqnqxomfjhy

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/KnhCGRrn

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Eulen

C2

kakamakasaka.duckdns.org:4782

Mutex

2979d7ad-e7c4-4aea-8e66-03f4b15f5f04

Attributes
  • encryption_key

    0E160FE515EFABA10C6407B1ADCA2222E4408D62

  • install_name

    AggregatorHost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek HD Audio Driver

  • subdirectory

    Host

Targets

    • Target

      loader_prod.exe

    • Size

      20.7MB

    • MD5

      87de1d182d3540a364412dbe8d8e6bba

    • SHA1

      69c9e8ee556f3563668ca17aafb56f2875bcb524

    • SHA256

      60e8bd0c2321279578cf429f2227ffd2fc1ed45f4b8bf9697d755d746f5ba1c4

    • SHA512

      1c88c268bdc9a4b5106e03b90a18dfd8202a3597527bcaab710886e9a922ecac5c3c44af930a57c81a2ad4aa24ec2e28290a5a46244553475335af2a2897f17f

    • SSDEEP

      393216:6WtM3GWaxlJuU/J3xmgiX3292YMJwF+lxismXsOwSUMtfKwQaZ12:71zlJnlxmV3292fSkxismXlpfnQC

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender notification settings

    • Modifies security service

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Async RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks