Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    250301-mk3e2aytby

  • MD5

    fcba5a159c1d4a387e0b6d819ab82b13

  • SHA1

    aa69a7ab7c5829823641342bec0e3ad9f6fed0eb

  • SHA256

    4e0b27339e784ecfec59332890bec0c7cd664b60416f61c9fef79d936e12d173

  • SHA512

    87a1081d1536779e44642d1951eca3e1ff3ba1fc4a333b5442c12b6fdb02b0bfff290503e160f6b95e20be6f7e007cbc9b331c7cf6ed0670cdb147c2f54b7d94

  • SSDEEP

    192:SKmamvfi3B3F3x3+3e3c04kJpga5k5M5uFpY9Hvva22jXv73Q1MA+L3LTLzm+3Hy:SKmamvfi3B3F3x3+3e3c04kJpgamCJ9R

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      fcba5a159c1d4a387e0b6d819ab82b13

    • SHA1

      aa69a7ab7c5829823641342bec0e3ad9f6fed0eb

    • SHA256

      4e0b27339e784ecfec59332890bec0c7cd664b60416f61c9fef79d936e12d173

    • SHA512

      87a1081d1536779e44642d1951eca3e1ff3ba1fc4a333b5442c12b6fdb02b0bfff290503e160f6b95e20be6f7e007cbc9b331c7cf6ed0670cdb147c2f54b7d94

    • SSDEEP

      192:SKmamvfi3B3F3x3+3e3c04kJpga5k5M5uFpY9Hvva22jXv73Q1MA+L3LTLzm+3Hy:SKmamvfi3B3F3x3+3e3c04kJpgamCJ9R

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1798) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks