Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    72ce53d9139bece6bc06ea320657ac8c1a4f196879fd7b8a41504f6020a28f98

  • Size

    1.7MB

  • Sample

    250321-yhgw4axway

  • MD5

    a9b6c35ba7e3bb02233913af411ebbdf

  • SHA1

    5a6c2cce32a00dcf9672607d6a64ab29d52ee020

  • SHA256

    72ce53d9139bece6bc06ea320657ac8c1a4f196879fd7b8a41504f6020a28f98

  • SHA512

    05645ae5528bd35bd5b158745abcdeacb788049c77acfd40fab558927e668493be412a62e6227525ed6aae697b1f2df6a75cdb6b83790968b2355dcb8d00ffe8

  • SSDEEP

    49152:zgqKIXzrCQMXjFzR4Sao0MKHrqeU8GIIMU5:zzPMzFzREo0xHG/5

Malware Config

Extracted

Family

asyncrat

Version

Venom Pwn3rzs' Edtition v6.0.1

Botnet

V-lg60

C2

37.48.64.102:4950

Mutex

yawyrgpacvfvsfgbz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

imagine.here-for-more.info:3960

neverdiedico.mypets.ws:3960

nvdiemosole.broke-it.net:3960

37.48.64.102:3960

Mutex

Y1BJNoYWQwOTPHJp

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

remcos

Botnet

TL-60

C2

dico.on-the-web.tv:3950

dr.is-gone.com:3950

dyndico.from-il.com:3950

nvdiemozess.broke-it.net:3950

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-Q5105M

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      72ce53d9139bece6bc06ea320657ac8c1a4f196879fd7b8a41504f6020a28f98

    • Size

      1.7MB

    • MD5

      a9b6c35ba7e3bb02233913af411ebbdf

    • SHA1

      5a6c2cce32a00dcf9672607d6a64ab29d52ee020

    • SHA256

      72ce53d9139bece6bc06ea320657ac8c1a4f196879fd7b8a41504f6020a28f98

    • SHA512

      05645ae5528bd35bd5b158745abcdeacb788049c77acfd40fab558927e668493be412a62e6227525ed6aae697b1f2df6a75cdb6b83790968b2355dcb8d00ffe8

    • SSDEEP

      49152:zgqKIXzrCQMXjFzR4Sao0MKHrqeU8GIIMU5:zzPMzFzREo0xHG/5

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks