Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    250227-tv1shsstat

  • MD5

    e4ab9be0cf5c27c72b420fc606e0700a

  • SHA1

    d3549211a3fdbd5e1fb153d2f7c711000b0339db

  • SHA256

    0bfa0c9ecd60657c9dee4a927bf6fb575c6593ec3756e9425642452749a3a40c

  • SHA512

    3e2b6dd99e8a0e4abc2a4a35a786de1d02d2b0fda5baa7390d53c70e31c978e62189d010741cc32d5bc5d613083cec1374501335a179f6fe533ff7170be7536b

  • SSDEEP

    96:fHncM5hGDpc21Y8abkXx2tKbkE2h2tdRPWAxHnc6phGvpthLVY8xd:V5aG2+rQxG/CC

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      e4ab9be0cf5c27c72b420fc606e0700a

    • SHA1

      d3549211a3fdbd5e1fb153d2f7c711000b0339db

    • SHA256

      0bfa0c9ecd60657c9dee4a927bf6fb575c6593ec3756e9425642452749a3a40c

    • SHA512

      3e2b6dd99e8a0e4abc2a4a35a786de1d02d2b0fda5baa7390d53c70e31c978e62189d010741cc32d5bc5d613083cec1374501335a179f6fe533ff7170be7536b

    • SSDEEP

      96:fHncM5hGDpc21Y8abkXx2tKbkE2h2tdRPWAxHnc6phGvpthLVY8xd:V5aG2+rQxG/CC

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2033) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks