Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Driver.exe

  • Size

    25.0MB

  • Sample

    250326-fgb1caxwht

  • MD5

    d59c641106a0f84c7f10d9d5d7b81f32

  • SHA1

    dfb4174de562975db1f24d932603e713545ed722

  • SHA256

    ae3541713637f26703a152a64e7b2f8419128d950dca68d7adb418b4d698ae23

  • SHA512

    97fe9bde621f21795d976d8e3c654e6e9338129341b504785ee2ce1361279b95ece9b9ef635c617b5c162135e540b9c4058d83aa8d7505505eb6f5af7eaed930

  • SSDEEP

    196608:GWE0Ne1qAS4eNTfm/pf+xk4dWRimrbW3jmyL:rXAS3y/pWu4kRimrbmyU

Malware Config

Targets

    • Target

      Driver.exe

    • Size

      25.0MB

    • MD5

      d59c641106a0f84c7f10d9d5d7b81f32

    • SHA1

      dfb4174de562975db1f24d932603e713545ed722

    • SHA256

      ae3541713637f26703a152a64e7b2f8419128d950dca68d7adb418b4d698ae23

    • SHA512

      97fe9bde621f21795d976d8e3c654e6e9338129341b504785ee2ce1361279b95ece9b9ef635c617b5c162135e540b9c4058d83aa8d7505505eb6f5af7eaed930

    • SSDEEP

      196608:GWE0Ne1qAS4eNTfm/pf+xk4dWRimrbW3jmyL:rXAS3y/pWu4kRimrbmyU

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks