Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8c4a05e63a083c05af96e08fcb3176ad22b4412d678dbe4b23464ff2658b4aa2.sh

  • Size

    15KB

  • Sample

    250224-dq7r9szqy5

  • MD5

    de04868319719fe6cae75e0e95f1ff99

  • SHA1

    89b5c616e043bd9a76a60bd51f69072b4865647c

  • SHA256

    8c4a05e63a083c05af96e08fcb3176ad22b4412d678dbe4b23464ff2658b4aa2

  • SHA512

    2aa88141791089306e2977182152747f47e623627568e6dfe992b38b7ed51a2c46108d3391127e151206e6d7a91884caa87c4c9fa7c5ac677219d68b3e03f4bb

  • SSDEEP

    384:r5JxgzLuqlH2wx2vUaQa5/eN86704s80ooJQYgykWT4yCtvUsDjdWOoJw3:trgXux7YJDj8OoJw3

Malware Config

Targets

    • Target

      8c4a05e63a083c05af96e08fcb3176ad22b4412d678dbe4b23464ff2658b4aa2.sh

    • Size

      15KB

    • MD5

      de04868319719fe6cae75e0e95f1ff99

    • SHA1

      89b5c616e043bd9a76a60bd51f69072b4865647c

    • SHA256

      8c4a05e63a083c05af96e08fcb3176ad22b4412d678dbe4b23464ff2658b4aa2

    • SHA512

      2aa88141791089306e2977182152747f47e623627568e6dfe992b38b7ed51a2c46108d3391127e151206e6d7a91884caa87c4c9fa7c5ac677219d68b3e03f4bb

    • SSDEEP

      384:r5JxgzLuqlH2wx2vUaQa5/eN86704s80ooJQYgykWT4yCtvUsDjdWOoJw3:trgXux7YJDj8OoJw3

    • Kinsing

      Kinsing is a loader written in Golang.

    • Kinsing Rootkit

      Rootkit reuses the publicly available BEURK rootkit.

    • Kinsing Rootkit payload

    • Kinsing family

    • Kinsing payload

    • Kinsing_rootkit family

    • Modifies the dynamic linker configuration file

      Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Flushes firewall rules

      Flushes/ disables firewall rules inside the Linux kernel.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Reads list of loaded kernel modules

      Reads the list of currently loaded kernel modules, possibly to detect virtual environments.

MITRE ATT&CK Enterprise v15

Tasks