Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    250105-xzc4ssvrbj

  • MD5

    e1c18218c4bce0c2a3dced659bbb5664

  • SHA1

    902a9e76207c09235d03a5fe5f591c4de95fdefd

  • SHA256

    ae8f54b27e4ea23e62511aca57058db7f1508ef48b9db4d874a983dd57e39496

  • SHA512

    c312141105c2ae0b71020bb94acbc4fd0802560654fc5b4776fe7f338da1079c6fe35dda0cd5217d74505657ef6f2a9b8f618211da30ecd07fe459cd2aae284b

  • SSDEEP

    192:TRrwd5rgFi2L9dJZASA+AMA5AZAuxtmd5rgFie9dTASA+AMA5AZAUr:TRrxxL9dJCdZ/iCuxtTL9dcdZ/iCUr

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      e1c18218c4bce0c2a3dced659bbb5664

    • SHA1

      902a9e76207c09235d03a5fe5f591c4de95fdefd

    • SHA256

      ae8f54b27e4ea23e62511aca57058db7f1508ef48b9db4d874a983dd57e39496

    • SHA512

      c312141105c2ae0b71020bb94acbc4fd0802560654fc5b4776fe7f338da1079c6fe35dda0cd5217d74505657ef6f2a9b8f618211da30ecd07fe459cd2aae284b

    • SSDEEP

      192:TRrwd5rgFi2L9dJZASA+AMA5AZAuxtmd5rgFie9dTASA+AMA5AZAUr:TRrxxL9dJCdZ/iCuxtTL9dcdZ/iCUr

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2132) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks