Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    e15212e4904fb23b4d3bfa791f67e5c1c96e24df10b6eedb34344d469bd2cf34

  • Size

    1.3MB

  • Sample

    221003-etjehsghhq

  • MD5

    6aa2dce23da063c3984e0ba40cb9b820

  • SHA1

    a5811d765a09bd446a1954d442fd03dafcb402db

  • SHA256

    e15212e4904fb23b4d3bfa791f67e5c1c96e24df10b6eedb34344d469bd2cf34

  • SHA512

    bb43bd1cbcda23739895aee44f8859e1b4876516285727f5a9f4076c503dd032c33a418dc9d02d02ddbfa5358ab33d6ed2439ebac5a73988ba936f28d6a1bda8

  • SSDEEP

    12288:SKmPKcel4LK12wVypaD5tgFn9Z02N3mFJH0UWxS1ORGR+fk9PPo+D4wSf:SucelR4wVypajmFBCJHPWxiORGr9PDXi

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e15212e4904fb23b4d3bfa791f67e5c1c96e24df10b6eedb34344d469bd2cf34

    • Size

      1.3MB

    • MD5

      6aa2dce23da063c3984e0ba40cb9b820

    • SHA1

      a5811d765a09bd446a1954d442fd03dafcb402db

    • SHA256

      e15212e4904fb23b4d3bfa791f67e5c1c96e24df10b6eedb34344d469bd2cf34

    • SHA512

      bb43bd1cbcda23739895aee44f8859e1b4876516285727f5a9f4076c503dd032c33a418dc9d02d02ddbfa5358ab33d6ed2439ebac5a73988ba936f28d6a1bda8

    • SSDEEP

      12288:SKmPKcel4LK12wVypaD5tgFn9Z02N3mFJH0UWxS1ORGR+fk9PPo+D4wSf:SucelR4wVypajmFBCJHPWxiORGr9PDXi

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks