Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
DriverBooster.exe
-
Size
6.9MB
-
Sample
250324-yl39havwcs
-
MD5
1c5de9b1f4973ff95f4d4ccf2364a2fe
-
SHA1
59b04e134e7a38f90f766f4d307c3634ff55f059
-
SHA256
a5cc7ba8a65d02e4ebb04c6086f329f176ba3d4f0b1c6591e7ba9879bdb27f00
-
SHA512
72bf480006202b54eee8f2ca3cbf7d81d88993a7c13ee8e2ab0879920da3b6770a2c6de3e8d9e83b3ba611bfb1465551f780f71176c970af19fad18942deaba3
-
SSDEEP
196608:oWt0MxWnneNTfm/pf+xk4dWRimrbW3jmyB:/En0y/pWu4kRimrbmyK
Behavioral task
behavioral1
Sample
DriverBooster.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
DriverBooster.exe
-
Size
6.9MB
-
MD5
1c5de9b1f4973ff95f4d4ccf2364a2fe
-
SHA1
59b04e134e7a38f90f766f4d307c3634ff55f059
-
SHA256
a5cc7ba8a65d02e4ebb04c6086f329f176ba3d4f0b1c6591e7ba9879bdb27f00
-
SHA512
72bf480006202b54eee8f2ca3cbf7d81d88993a7c13ee8e2ab0879920da3b6770a2c6de3e8d9e83b3ba611bfb1465551f780f71176c970af19fad18942deaba3
-
SSDEEP
196608:oWt0MxWnneNTfm/pf+xk4dWRimrbW3jmyB:/En0y/pWu4kRimrbmyK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-