Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
50ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44.zip
-
Size
1.7MB
-
Sample
250326-akemrayj18
-
MD5
3af3b4a5a266993364d69332dc84c812
-
SHA1
282afde70a077ae72bc3fd6517e7eaee21de5927
-
SHA256
50ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44
-
SHA512
b7e3b32c37ab5c63f20119bedc16532edad21ba58fe2c4a34d5eff69d3ad7f5c4901af83a169943ca7d86cde01307c33f19ba1ff3d9264b563f2c62af91dd322
-
SSDEEP
49152:857NjZf9Lvpl774uHqJvhG00+AnaRxYDLv7kNTqcwy47iRTpkP38:ElLzYbwna0vvgFeTit
Static task
static1
Behavioral task
behavioral1
Sample
021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
cryptbot
nkoopw11.top
moraass08.top
Targets
-
-
Target
021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
-
Size
1.8MB
-
MD5
d8a8599e2325010e356d1bf13395e0af
-
SHA1
689a59ba3a0c4cfcbae7201cc09a986bc968b8f2
-
SHA256
021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba
-
SHA512
a56632b88a8b5e2bb938ee68a6a672650d2386ea18975b9d58156f2ad9efac5e4d6fa574e4c28a213cffd5c44c0355c5005e04b9801c92fe2ceef4a342e08799
-
SSDEEP
49152:6sOXm4VF5ZCVpSm3/gjkl0+827d/GpncQ:6nxwDf3IjX27ocQ
Score10/10-
CryptBot payload
-
Cryptbot family
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Deobfuscate/Decode Files or Information
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2