Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    9600e4ad6906b2f7ce9626b8b3e38c7ad28f38c4caff2a4b5b3c20b52bda90f2

  • Size

    100KB

  • Sample

    221020-ntvxzscacr

  • MD5

    56ba59179be3ec7709b7e5c2851d73e7

  • SHA1

    63dd831259afd1a53f5f7dfa34641c5b43f4e99a

  • SHA256

    9600e4ad6906b2f7ce9626b8b3e38c7ad28f38c4caff2a4b5b3c20b52bda90f2

  • SHA512

    d0ae642856e6e489042e45549900035501d8a13adfdee568b3c4d51d6acd7c4a8a14e326cf53f09cd6a0a0c71287f65bcf002f657cda7888a8435f48a2586bb1

  • SSDEEP

    1536:dSHuZJWXOghqNtlCkgbh+owyAe+JWhrole6uIfRvsEr+VF9CF3f0xK:NvWZhq7lENlwRzaovflsEr+P9CFcU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      9600e4ad6906b2f7ce9626b8b3e38c7ad28f38c4caff2a4b5b3c20b52bda90f2

    • Size

      100KB

    • MD5

      56ba59179be3ec7709b7e5c2851d73e7

    • SHA1

      63dd831259afd1a53f5f7dfa34641c5b43f4e99a

    • SHA256

      9600e4ad6906b2f7ce9626b8b3e38c7ad28f38c4caff2a4b5b3c20b52bda90f2

    • SHA512

      d0ae642856e6e489042e45549900035501d8a13adfdee568b3c4d51d6acd7c4a8a14e326cf53f09cd6a0a0c71287f65bcf002f657cda7888a8435f48a2586bb1

    • SSDEEP

      1536:dSHuZJWXOghqNtlCkgbh+owyAe+JWhrole6uIfRvsEr+VF9CF3f0xK:NvWZhq7lENlwRzaovflsEr+P9CFcU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks