Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    DriverBooster.exe

  • Size

    6.9MB

  • Sample

    250324-ycq8ksvvbs

  • MD5

    1c5de9b1f4973ff95f4d4ccf2364a2fe

  • SHA1

    59b04e134e7a38f90f766f4d307c3634ff55f059

  • SHA256

    a5cc7ba8a65d02e4ebb04c6086f329f176ba3d4f0b1c6591e7ba9879bdb27f00

  • SHA512

    72bf480006202b54eee8f2ca3cbf7d81d88993a7c13ee8e2ab0879920da3b6770a2c6de3e8d9e83b3ba611bfb1465551f780f71176c970af19fad18942deaba3

  • SSDEEP

    196608:oWt0MxWnneNTfm/pf+xk4dWRimrbW3jmyB:/En0y/pWu4kRimrbmyK

Malware Config

Targets

    • Target

      DriverBooster.exe

    • Size

      6.9MB

    • MD5

      1c5de9b1f4973ff95f4d4ccf2364a2fe

    • SHA1

      59b04e134e7a38f90f766f4d307c3634ff55f059

    • SHA256

      a5cc7ba8a65d02e4ebb04c6086f329f176ba3d4f0b1c6591e7ba9879bdb27f00

    • SHA512

      72bf480006202b54eee8f2ca3cbf7d81d88993a7c13ee8e2ab0879920da3b6770a2c6de3e8d9e83b3ba611bfb1465551f780f71176c970af19fad18942deaba3

    • SSDEEP

      196608:oWt0MxWnneNTfm/pf+xk4dWRimrbW3jmyB:/En0y/pWu4kRimrbmyK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks