Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
bash.sh
-
Size
2KB
-
Sample
250326-lcdw2a1tey
-
MD5
e9d282fe04078b2d45522facfce2df0b
-
SHA1
3cf77dfbbc7cf114515f94e5ecd0c38c3819fd83
-
SHA256
8325ad7ebed7fdd287cc0cd89f81a51617a64b38d09fa3d84c9141477e0dd415
-
SHA512
26e33128cbbacccc6897c50e723342c6f11c31668353ae553de4a96ac6af7634921a0f269141f11acc4928d8d17edcd9dacd022b949b7a42776df5c248629096
Static task
static1
Behavioral task
behavioral1
Sample
bash.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bash.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
bash.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bash.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
OWARI
newageofkifirempire.camdvr.org
Extracted
mirai
OWARI
Extracted
mirai
OWARI
Extracted
mirai
OWARI
newageofkifirempire.camdvr.org
Extracted
mirai
OWARI
newageofkifirempire.camdvr.org
Extracted
mirai
OWARI
newageofkifirempire.camdvr.org
Targets
-
-
Target
bash.sh
-
Size
2KB
-
MD5
e9d282fe04078b2d45522facfce2df0b
-
SHA1
3cf77dfbbc7cf114515f94e5ecd0c38c3819fd83
-
SHA256
8325ad7ebed7fdd287cc0cd89f81a51617a64b38d09fa3d84c9141477e0dd415
-
SHA512
26e33128cbbacccc6897c50e723342c6f11c31668353ae553de4a96ac6af7634921a0f269141f11acc4928d8d17edcd9dacd022b949b7a42776df5c248629096
-
Mirai family
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1