Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    890bba4bd5423d85f820113af05ddd6f7f7cd7d7a648af4b642a91721613ea13

  • Size

    100KB

  • Sample

    221106-xj4ltagaf7

  • MD5

    07a35c9cc3b1a5ee362b8af6e8fd27a6

  • SHA1

    13ffb83d880b50893653e4e89c51ff5d2842679b

  • SHA256

    890bba4bd5423d85f820113af05ddd6f7f7cd7d7a648af4b642a91721613ea13

  • SHA512

    c1861231704c0b46f975ca3c94eb59704efd78fc39bb93c122354bb85e0d4529eb80ae797cd4de60303dd637918442b2f769979dff7bbd744965f1f40f5236c9

  • SSDEEP

    3072:P5XbZMlNQZsYoUNj+nGtwCgfJ49rHhOhs:9QQiYDanGlgfuOhs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      890bba4bd5423d85f820113af05ddd6f7f7cd7d7a648af4b642a91721613ea13

    • Size

      100KB

    • MD5

      07a35c9cc3b1a5ee362b8af6e8fd27a6

    • SHA1

      13ffb83d880b50893653e4e89c51ff5d2842679b

    • SHA256

      890bba4bd5423d85f820113af05ddd6f7f7cd7d7a648af4b642a91721613ea13

    • SHA512

      c1861231704c0b46f975ca3c94eb59704efd78fc39bb93c122354bb85e0d4529eb80ae797cd4de60303dd637918442b2f769979dff7bbd744965f1f40f5236c9

    • SSDEEP

      3072:P5XbZMlNQZsYoUNj+nGtwCgfJ49rHhOhs:9QQiYDanGlgfuOhs

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks