Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    BootstrapperNew.exe

  • Size

    3.4MB

  • Sample

    250328-mc49navtbx

  • MD5

    07b2ed9af56f55a999156738b17848df

  • SHA1

    960e507c0ef860080b573c4e11a76328c8831d08

  • SHA256

    73427b83bd00a8745e5182d2cdb3727e654ae9af5e42befc45903027f6606597

  • SHA512

    3a982d1130b41e6c01943eee7fa546c3da95360afdad03bff434b9211201c80f22bd8bf79d065180010bc0659ee1e71febbfd750320d95811ee26a54ee1b34c6

  • SSDEEP

    98304:HZXfHaFoQyDIvqkqXf0FglY1XOe97vLn:RaBqkSIglY1XOCnn

Malware Config

Targets

    • Target

      BootstrapperNew.exe

    • Size

      3.4MB

    • MD5

      07b2ed9af56f55a999156738b17848df

    • SHA1

      960e507c0ef860080b573c4e11a76328c8831d08

    • SHA256

      73427b83bd00a8745e5182d2cdb3727e654ae9af5e42befc45903027f6606597

    • SHA512

      3a982d1130b41e6c01943eee7fa546c3da95360afdad03bff434b9211201c80f22bd8bf79d065180010bc0659ee1e71febbfd750320d95811ee26a54ee1b34c6

    • SSDEEP

      98304:HZXfHaFoQyDIvqkqXf0FglY1XOe97vLn:RaBqkSIglY1XOCnn

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks