Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    16b76886a277b914372d8ad3da50f511

  • Size

    520KB

  • Sample

    231225-mcxvksefc4

  • MD5

    16b76886a277b914372d8ad3da50f511

  • SHA1

    375fd05f0ecfb36884ebf80aa951738e44b9481f

  • SHA256

    33001f3175b74bd653f9e2cd2aafeb280820b8778d71f4f859058548f12f4c2f

  • SHA512

    43e355dbabd6abef06fe6bf00c140552be70f21f43977b6973730c865c597abd61ce7032eab004ef38fc6e42d0de9a988380e5dbf049583914c3c8d433b151d7

  • SSDEEP

    12288:Gy7GJaXTC4IsjkvK1gtvkUTWFnH//ZNm45eO:tXcLKGtsfx1v

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      16b76886a277b914372d8ad3da50f511

    • Size

      520KB

    • MD5

      16b76886a277b914372d8ad3da50f511

    • SHA1

      375fd05f0ecfb36884ebf80aa951738e44b9481f

    • SHA256

      33001f3175b74bd653f9e2cd2aafeb280820b8778d71f4f859058548f12f4c2f

    • SHA512

      43e355dbabd6abef06fe6bf00c140552be70f21f43977b6973730c865c597abd61ce7032eab004ef38fc6e42d0de9a988380e5dbf049583914c3c8d433b151d7

    • SSDEEP

      12288:Gy7GJaXTC4IsjkvK1gtvkUTWFnH//ZNm45eO:tXcLKGtsfx1v

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.