Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    250228-f1w5matjv2

  • MD5

    97982e7de5b089918c84f5769ac0eda3

  • SHA1

    6e77d8eaa36a9266927f0df9223d11d8808101b7

  • SHA256

    67fb57dc230fd70fdae2f18e1bf44b691a40dc151334bf7d5e95322e60466aa1

  • SHA512

    43c04300d6151b49107a0bc06e8a1eda6a74ba3367ee27933744e882cd51859a0069ec4248ea40b477307795cabb8d3c16ef467c1a5e0879a2b1fb1b45fde454

  • SSDEEP

    192:u4AFWyxBRpm/DWgxh237Ix3ShrKLxh237sk4AFWyxJRpm/DIa:u4AFWyxBRpm/DWgxh237Ix3ShrKLxh2K

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      97982e7de5b089918c84f5769ac0eda3

    • SHA1

      6e77d8eaa36a9266927f0df9223d11d8808101b7

    • SHA256

      67fb57dc230fd70fdae2f18e1bf44b691a40dc151334bf7d5e95322e60466aa1

    • SHA512

      43c04300d6151b49107a0bc06e8a1eda6a74ba3367ee27933744e882cd51859a0069ec4248ea40b477307795cabb8d3c16ef467c1a5e0879a2b1fb1b45fde454

    • SSDEEP

      192:u4AFWyxBRpm/DWgxh237Ix3ShrKLxh237sk4AFWyxJRpm/DIa:u4AFWyxBRpm/DWgxh237Ix3ShrKLxh2K

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1904) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks