Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
WQW6HU4YD5
-
Size
692KB
-
Sample
250327-ewh7jaxtdz
-
MD5
646ca225a9bfa980b143fde9845f32b7
-
SHA1
5ada0fd44beef0e3b8d0bfb3889b0337d67dccac
-
SHA256
81eb62b4d44a816986434bcf657286b7adee416e480b27fc313a8e8cd8461cf1
-
SHA512
542b86e7a0558620927608a55cf0f651879d1c8d5041d013d8d3be205808fcf885c580fe90a7e97bc0a622730b498661539062591e5864a868b7179f6bea9657
-
SSDEEP
12288:rI4+9t5TIh1UDUggLNTvVOUjqCl2vG9y0tpVufz/p49Dc/s5HVY81:rZAt5TIbUy5jqCeQDepYDysZ1
Static task
static1
Behavioral task
behavioral1
Sample
WQW6HU4YD5
Resource
ubuntu2404-amd64-20250307-en
Malware Config
Extracted
/run/initramfs/readme_unlock.html
Extracted
/run/initramfs/readme_unlock.html
Extracted
/run/udev/data/readme_unlock.html
Targets
-
-
Target
WQW6HU4YD5
-
Size
692KB
-
MD5
646ca225a9bfa980b143fde9845f32b7
-
SHA1
5ada0fd44beef0e3b8d0bfb3889b0337d67dccac
-
SHA256
81eb62b4d44a816986434bcf657286b7adee416e480b27fc313a8e8cd8461cf1
-
SHA512
542b86e7a0558620927608a55cf0f651879d1c8d5041d013d8d3be205808fcf885c580fe90a7e97bc0a622730b498661539062591e5864a868b7179f6bea9657
-
SSDEEP
12288:rI4+9t5TIh1UDUggLNTvVOUjqCl2vG9y0tpVufz/p49Dc/s5HVY81:rZAt5TIbUy5jqCeQDepYDysZ1
-
Modifies user home skeleton directory
Modifies skeleton of initial home directory of newly added system users.
-
Reads user data of web browsers
Reads stored browser data which can include saved credentials.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads network interface configuration
Fetches information about one or more active network interfaces.
-
Modifies Bash startup script
-
Security Software Discovery
Adversaries may attempt to discover installed security software and its configurations.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Defense Evasion
Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Virtualization/Sandbox Evasion
1System Checks
1Discovery
Browser Information Discovery
1Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
4System Network Configuration Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
1System Checks
1