Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
Size
30.1MB
-
Sample
250328-a6gn8szxav
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
Static task
static1
Behavioral task
behavioral1
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Targets
-
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
Size
30.1MB
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
-
Asyncrat family
-
Modifies Windows Defender notification settings
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1