Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
loader_prod.exe
-
Size
20.7MB
-
Sample
250314-1fby6sztfy
-
MD5
87de1d182d3540a364412dbe8d8e6bba
-
SHA1
69c9e8ee556f3563668ca17aafb56f2875bcb524
-
SHA256
60e8bd0c2321279578cf429f2227ffd2fc1ed45f4b8bf9697d755d746f5ba1c4
-
SHA512
1c88c268bdc9a4b5106e03b90a18dfd8202a3597527bcaab710886e9a922ecac5c3c44af930a57c81a2ad4aa24ec2e28290a5a46244553475335af2a2897f17f
-
SSDEEP
393216:6WtM3GWaxlJuU/J3xmgiX3292YMJwF+lxismXsOwSUMtfKwQaZ12:71zlJnlxmV3292fSkxismXlpfnQC
Static task
static1
Behavioral task
behavioral1
Sample
loader_prod.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader_prod.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV3
deqnqxomfjhy
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Extracted
quasar
1.4.1
Eulen
kakamakasaka.duckdns.org:4782
2979d7ad-e7c4-4aea-8e66-03f4b15f5f04
-
encryption_key
0E160FE515EFABA10C6407B1ADCA2222E4408D62
-
install_name
AggregatorHost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek HD Audio Driver
-
subdirectory
Host
Targets
-
-
Target
loader_prod.exe
-
Size
20.7MB
-
MD5
87de1d182d3540a364412dbe8d8e6bba
-
SHA1
69c9e8ee556f3563668ca17aafb56f2875bcb524
-
SHA256
60e8bd0c2321279578cf429f2227ffd2fc1ed45f4b8bf9697d755d746f5ba1c4
-
SHA512
1c88c268bdc9a4b5106e03b90a18dfd8202a3597527bcaab710886e9a922ecac5c3c44af930a57c81a2ad4aa24ec2e28290a5a46244553475335af2a2897f17f
-
SSDEEP
393216:6WtM3GWaxlJuU/J3xmgiX3292YMJwF+lxismXsOwSUMtfKwQaZ12:71zlJnlxmV3292fSkxismXlpfnQC
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Defender notification settings
-
Modifies security service
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1