Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6dad95abd55beb7e69c7331e186cfffec1a9c89b8f4d58b5fe53db8c082bee99

  • Size

    200KB

  • Sample

    221002-vbkgvsggcm

  • MD5

    6fc4a01694ec42707b4ede49510be100

  • SHA1

    9291ba8ebbb1ba01e38d727fdd77cb5aa027b4a6

  • SHA256

    6dad95abd55beb7e69c7331e186cfffec1a9c89b8f4d58b5fe53db8c082bee99

  • SHA512

    ed4fc889733e7bb6aa39fabd7bc34314bab61f6a50bd50eac8c56e08626186d6b6aee3a2054eff6536d40617ef1e778b9df3e8f83cb2133a018e1543baa008c0

  • SSDEEP

    3072:TQIVRTXJiP+1bbLDtpJuHnjl9DrXwmqtaBL0GFkfRXk3UqRgrXH2TPFfth/S8lpe:TJUcH/tpE9tJ0Ekp03UqRqWTFl5S8jYJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      6dad95abd55beb7e69c7331e186cfffec1a9c89b8f4d58b5fe53db8c082bee99

    • Size

      200KB

    • MD5

      6fc4a01694ec42707b4ede49510be100

    • SHA1

      9291ba8ebbb1ba01e38d727fdd77cb5aa027b4a6

    • SHA256

      6dad95abd55beb7e69c7331e186cfffec1a9c89b8f4d58b5fe53db8c082bee99

    • SHA512

      ed4fc889733e7bb6aa39fabd7bc34314bab61f6a50bd50eac8c56e08626186d6b6aee3a2054eff6536d40617ef1e778b9df3e8f83cb2133a018e1543baa008c0

    • SSDEEP

      3072:TQIVRTXJiP+1bbLDtpJuHnjl9DrXwmqtaBL0GFkfRXk3UqRgrXH2TPFfth/S8lpe:TJUcH/tpE9tJ0Ekp03UqRqWTFl5S8jYJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks