Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    7f65f1d3cc38298c0b27c6f307b51a578619a16f12d3e8c662c3b7e290d08ebe.sh

  • Size

    15KB

  • Sample

    250224-dnhqcszlgk

  • MD5

    34ac9486a95651a465a5fc6039c2819a

  • SHA1

    274290fc9187e8f3504aec78ea1ef8984b5099d3

  • SHA256

    7f65f1d3cc38298c0b27c6f307b51a578619a16f12d3e8c662c3b7e290d08ebe

  • SHA512

    9c886b2976fc624ada4d5ed34f662a7aff682bae4bb4f37a519d50bd94ef019924a96aeb4b84fbee3136114e4f8d6ce5626d40b123622f3ceeb06de9969b9409

  • SSDEEP

    384:r5JxgzLuqlH2wx2vUaQa5/eN86704s80ooJQYgykWT4yCtvUsDjdWOoJwN:trgXux7YJDj8OoJwN

Malware Config

Targets

    • Target

      7f65f1d3cc38298c0b27c6f307b51a578619a16f12d3e8c662c3b7e290d08ebe.sh

    • Size

      15KB

    • MD5

      34ac9486a95651a465a5fc6039c2819a

    • SHA1

      274290fc9187e8f3504aec78ea1ef8984b5099d3

    • SHA256

      7f65f1d3cc38298c0b27c6f307b51a578619a16f12d3e8c662c3b7e290d08ebe

    • SHA512

      9c886b2976fc624ada4d5ed34f662a7aff682bae4bb4f37a519d50bd94ef019924a96aeb4b84fbee3136114e4f8d6ce5626d40b123622f3ceeb06de9969b9409

    • SSDEEP

      384:r5JxgzLuqlH2wx2vUaQa5/eN86704s80ooJQYgykWT4yCtvUsDjdWOoJwN:trgXux7YJDj8OoJwN

    • Kinsing

      Kinsing is a loader written in Golang.

    • Kinsing Rootkit

      Rootkit reuses the publicly available BEURK rootkit.

    • Kinsing Rootkit payload

    • Kinsing family

    • Kinsing payload

    • Kinsing_rootkit family

    • Modifies the dynamic linker configuration file

      Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Flushes firewall rules

      Flushes/ disables firewall rules inside the Linux kernel.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.