Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Update.exe

  • Size

    9.5MB

  • Sample

    250315-1ephwaxps9

  • MD5

    78bf7bc31ad99983c225a0f8a28ae27f

  • SHA1

    e5cb021b61bf9feace51de74c6afeaa32bd2db52

  • SHA256

    b8a4ce5511e2c005767a77bc1d472fbb324a186d75b6a3a4a53bd53467d965fb

  • SHA512

    d7fef696bc2ad679e394b8d3eeeaead5101f9039e2cc75860b021d53f210285da34f97b7e618d63542dd5761268c17e34687cd8dc6480643a176029010a9a55a

  • SSDEEP

    196608:u0nM28FouG0bBrmRXwXXnbRHvUWvoghxRno/w3iFCxwQbRtXpDpvMNgmp:1YWgXXbRHdlxNo/w3uCxwQb5JMNlp

Malware Config

Targets

    • Target

      Update.exe

    • Size

      9.5MB

    • MD5

      78bf7bc31ad99983c225a0f8a28ae27f

    • SHA1

      e5cb021b61bf9feace51de74c6afeaa32bd2db52

    • SHA256

      b8a4ce5511e2c005767a77bc1d472fbb324a186d75b6a3a4a53bd53467d965fb

    • SHA512

      d7fef696bc2ad679e394b8d3eeeaead5101f9039e2cc75860b021d53f210285da34f97b7e618d63542dd5761268c17e34687cd8dc6480643a176029010a9a55a

    • SSDEEP

      196608:u0nM28FouG0bBrmRXwXXnbRHvUWvoghxRno/w3iFCxwQbRtXpDpvMNgmp:1YWgXXbRHdlxNo/w3uCxwQb5JMNlp

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks