Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    mpsl.elf

  • Size

    210KB

  • Sample

    250328-d4bxratls9

  • MD5

    55076d662d3e4ab0ebed50e63bc9de51

  • SHA1

    900a6070b2463704cf1e872ffe79f42c7648f9de

  • SHA256

    9f725587128c1eb840279db0ce8256f9cb8098b742f7f863addf18be610d4979

  • SHA512

    06a4c8c28eeda5d62858d1b8f92b5aafb6305077782266354c7895128a7990c940a269668e703113e8a1e888ad9228275d7ef910ef8e7b627c1afd7cb7a7ed1a

  • SSDEEP

    1536:CispmDKOVez/ot3umsrIu9aTsmMD+zo57HSo20bIxQbDrKpHN8cUMEll+nHO0jsC:Vs+K8ez/c+Zrv9P57N2Bx/ptNnHS

Malware Config

Targets

    • Target

      mpsl.elf

    • Size

      210KB

    • MD5

      55076d662d3e4ab0ebed50e63bc9de51

    • SHA1

      900a6070b2463704cf1e872ffe79f42c7648f9de

    • SHA256

      9f725587128c1eb840279db0ce8256f9cb8098b742f7f863addf18be610d4979

    • SHA512

      06a4c8c28eeda5d62858d1b8f92b5aafb6305077782266354c7895128a7990c940a269668e703113e8a1e888ad9228275d7ef910ef8e7b627c1afd7cb7a7ed1a

    • SSDEEP

      1536:CispmDKOVez/ot3umsrIu9aTsmMD+zo57HSo20bIxQbDrKpHN8cUMEll+nHO0jsC:Vs+K8ez/c+Zrv9P57N2Bx/ptNnHS

    • Contacts a large (28253) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks