Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
Size
30.1MB
-
Sample
250328-e7bxla11ev
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
Static task
static1
Behavioral task
behavioral1
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Targets
-
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
Size
30.1MB
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
-
Asyncrat family
-
Modifies Windows Defender notification settings
-
Async RAT payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1