Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc
-
Size
20.8MB
-
Sample
250328-a8w7pszxcw
-
MD5
a850018996dace168754fcf5da674b81
-
SHA1
8c893659bca023f30cd9fd4348c4b383caee8e43
-
SHA256
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc
-
SHA512
75a305c67d0e8e6ab34f8f593fcc0f9a89d5c40c8b231657751b63e855478bb3787851cd0e319743ad1aa21e4ca15d398f2a91d01448de146e60c5bdf4b286f0
-
SSDEEP
393216:w3Tc4BVJHWsi1B8k/z3sXCeIxO3Y3HmgEwP6cv/3X38WdGe:wQ4BbHql/zcXz3Y3Qwv3X38Wj
Static task
static1
Behavioral task
behavioral1
Sample
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Targets
-
-
Target
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc
-
Size
20.8MB
-
MD5
a850018996dace168754fcf5da674b81
-
SHA1
8c893659bca023f30cd9fd4348c4b383caee8e43
-
SHA256
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc
-
SHA512
75a305c67d0e8e6ab34f8f593fcc0f9a89d5c40c8b231657751b63e855478bb3787851cd0e319743ad1aa21e4ca15d398f2a91d01448de146e60c5bdf4b286f0
-
SSDEEP
393216:w3Tc4BVJHWsi1B8k/z3sXCeIxO3Y3HmgEwP6cv/3X38WdGe:wQ4BbHql/zcXz3Y3Qwv3X38Wj
-
Asyncrat family
-
Modifies Windows Defender notification settings
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1