Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/03/2025, 09:19

250317-lajz9swvbv 4

14/03/2025, 20:12

250314-yy3tha1rs4 10

General

  • Target

    free.panel.rar.html

  • Size

    9KB

  • Sample

    250314-yy3tha1rs4

  • MD5

    87eed16d3517b84785e333076f2f1db1

  • SHA1

    9cf5fa92b7c84b583760e64b71df8e28fd54d891

  • SHA256

    b72330d80e92063db94fb321e42789dd870b8580d40d44ef17c77ee6b23cc5d1

  • SHA512

    95d08591cd029d8455f489839dc034dba96a68674f477281fb82b57e8fa76f69756aad911bb2681776cf3280072bde767f59129ab006a4a874f54b32d1c1158b

  • SSDEEP

    192:WHQs+W33+IQZBftXI3AXSIdSrHhAEtwFlQYx+bPiqlc2Db1:WHQs+23+nZBftGeh6HgbWPlc2Db1

Malware Config

Targets

    • Target

      free.panel.rar.html

    • Size

      9KB

    • MD5

      87eed16d3517b84785e333076f2f1db1

    • SHA1

      9cf5fa92b7c84b583760e64b71df8e28fd54d891

    • SHA256

      b72330d80e92063db94fb321e42789dd870b8580d40d44ef17c77ee6b23cc5d1

    • SHA512

      95d08591cd029d8455f489839dc034dba96a68674f477281fb82b57e8fa76f69756aad911bb2681776cf3280072bde767f59129ab006a4a874f54b32d1c1158b

    • SSDEEP

      192:WHQs+W33+IQZBftXI3AXSIdSrHhAEtwFlQYx+bPiqlc2Db1:WHQs+23+nZBftGeh6HgbWPlc2Db1

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks