Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    3339f240ffeb755b2f4874cbd4d0bbf7.exe

  • Size

    11.6MB

  • Sample

    250317-dn56naytgv

  • MD5

    3339f240ffeb755b2f4874cbd4d0bbf7

  • SHA1

    c81181e483cdfc5fc552f22b3dcfa0cd2782cf34

  • SHA256

    a7deeabed9261564ba79c04d3909539ec31bada0b1c4e16755d759f742fb9818

  • SHA512

    b252e1037c6126ded63491f09b1b7e4aa651feef449c79f781c3a2262658831eca6208a33c0076f757010c6a96cb7f582e846c6c8af33ecb651bf271e691c9ce

  • SSDEEP

    196608:krNm6AcQaUw3990H1+njZeHWpHGpvF6NIbxqZuROk1CbtQvEp4Q28Q:kheCIwnOWMpvsiQURXUBQvk4Q2j

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

thursday-bytes.gl.at.ply.gg:55648

Mutex

caa5ab06fdce65c809c563c98d39620a

Attributes
  • reg_key

    caa5ab06fdce65c809c563c98d39620a

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      3339f240ffeb755b2f4874cbd4d0bbf7.exe

    • Size

      11.6MB

    • MD5

      3339f240ffeb755b2f4874cbd4d0bbf7

    • SHA1

      c81181e483cdfc5fc552f22b3dcfa0cd2782cf34

    • SHA256

      a7deeabed9261564ba79c04d3909539ec31bada0b1c4e16755d759f742fb9818

    • SHA512

      b252e1037c6126ded63491f09b1b7e4aa651feef449c79f781c3a2262658831eca6208a33c0076f757010c6a96cb7f582e846c6c8af33ecb651bf271e691c9ce

    • SSDEEP

      196608:krNm6AcQaUw3990H1+njZeHWpHGpvF6NIbxqZuROk1CbtQvEp4Q28Q:kheCIwnOWMpvsiQURXUBQvk4Q2j

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks