Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    arm5.elf

  • Size

    116KB

  • Sample

    250328-eqv9xatmw6

  • MD5

    2801ac08801e960a9e9f1d2abd7f5b4b

  • SHA1

    48ba8d8b3ec5d718697835279f637b0ae45b6081

  • SHA256

    5b228f994b7fe9ec41e8d1ff535aa7842bce3fc38b03a9009139a31e2077e7f5

  • SHA512

    01dee1178b76c3feef9158f8820407d65e074e2a43d0facbbfb9839eff0f5c966314419ba82a25a3394c9e20054c86f69af96c18bfe2dcbd0408301879954854

  • SSDEEP

    3072:RBmKyo0CgHtFdRtoH0skJkZaWL4YuBRBG6f3ON1LknQ/:RBmKyo0CgHtFdH4qJ7W/IRBhf61L

Malware Config

Targets

    • Target

      arm5.elf

    • Size

      116KB

    • MD5

      2801ac08801e960a9e9f1d2abd7f5b4b

    • SHA1

      48ba8d8b3ec5d718697835279f637b0ae45b6081

    • SHA256

      5b228f994b7fe9ec41e8d1ff535aa7842bce3fc38b03a9009139a31e2077e7f5

    • SHA512

      01dee1178b76c3feef9158f8820407d65e074e2a43d0facbbfb9839eff0f5c966314419ba82a25a3394c9e20054c86f69af96c18bfe2dcbd0408301879954854

    • SSDEEP

      3072:RBmKyo0CgHtFdRtoH0skJkZaWL4YuBRBG6f3ON1LknQ/:RBmKyo0CgHtFdH4qJ7W/IRBhf61L

    • Contacts a large (31332) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks