Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    dc685713843da5bfcbfcc289456d2d9430cbdff9108a8d01b4759728cc5d813e

  • Size

    1.7MB

  • Sample

    250318-pcpkbawlw8

  • MD5

    7026ed6db478e504b8a3bcc554c32a87

  • SHA1

    1951ab06af8da8f2b0c33f7b221b0cb95d33250a

  • SHA256

    dc685713843da5bfcbfcc289456d2d9430cbdff9108a8d01b4759728cc5d813e

  • SHA512

    ad5fbf1d6aeb823bee4cdb0245579e98dfad23ef886c69840da73e5b8ed5636975e0ddb16004d335397f3d234ec33ec1e7de111d41294c1b46d58f3e5154d48d

  • SSDEEP

    24576:pilxhO8efwEYKcCXP+IrOOVjiSM39ey/XBPtkr//G5JGU6Nz/MdZOPSlL:UlU+KX+eOGjeYYxPtk/syEoPSl

Malware Config

Targets

    • Target

      dc685713843da5bfcbfcc289456d2d9430cbdff9108a8d01b4759728cc5d813e

    • Size

      1.7MB

    • MD5

      7026ed6db478e504b8a3bcc554c32a87

    • SHA1

      1951ab06af8da8f2b0c33f7b221b0cb95d33250a

    • SHA256

      dc685713843da5bfcbfcc289456d2d9430cbdff9108a8d01b4759728cc5d813e

    • SHA512

      ad5fbf1d6aeb823bee4cdb0245579e98dfad23ef886c69840da73e5b8ed5636975e0ddb16004d335397f3d234ec33ec1e7de111d41294c1b46d58f3e5154d48d

    • SSDEEP

      24576:pilxhO8efwEYKcCXP+IrOOVjiSM39ey/XBPtkr//G5JGU6Nz/MdZOPSlL:UlU+KX+eOGjeYYxPtk/syEoPSl

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Loaderbot family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Cryptocurrency Miner

      Makes network request to known mining pool URL.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks