Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ubuntu.sh
-
Size
608B
-
Sample
250328-hc2fjssya1
-
MD5
0a8ecf977231b05a401ca6393d3b7ef8
-
SHA1
bad37c38b204d8e965e2d58e37920d18266e163c
-
SHA256
45245cfb80fc049dbf862f7e2e23eebcda2a0d52c8e8ecdcb47a41a4760fd5a9
-
SHA512
9a6da586643c0c4ea4983c7aacbe2ea68d5ee8b861ea68698d9cb150caf3f1b7e512250bc568c08367d7714b15e5d883c46280b567fdd9f13c0cac56c3f754db
Static task
static1
Behavioral task
behavioral1
Sample
ubuntu.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
ubuntu.sh
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral3
Sample
ubuntu.sh
Resource
ubuntu2204-amd64-20250307-en
Behavioral task
behavioral4
Sample
ubuntu.sh
Resource
ubuntu2404-amd64-20250307-en
Malware Config
Targets
-
-
Target
ubuntu.sh
-
Size
608B
-
MD5
0a8ecf977231b05a401ca6393d3b7ef8
-
SHA1
bad37c38b204d8e965e2d58e37920d18266e163c
-
SHA256
45245cfb80fc049dbf862f7e2e23eebcda2a0d52c8e8ecdcb47a41a4760fd5a9
-
SHA512
9a6da586643c0c4ea4983c7aacbe2ea68d5ee8b861ea68698d9cb150caf3f1b7e512250bc568c08367d7714b15e5d883c46280b567fdd9f13c0cac56c3f754db
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Checks mountinfo of local process
Checks mountinfo of running processes which indicate if it is running in chroot jail.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Abuse Elevation Control Mechanism
1Sudo and Sudo Caching
1Deobfuscate/Decode Files or Information
1Indicator Removal
1Clear Linux or Mac System Logs
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
OS Credential Dumping
2/etc/passwd and /etc/shadow
1Proc Filesystem
1