Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ubuntu.sh

  • Size

    608B

  • Sample

    250328-hc2fjssya1

  • MD5

    0a8ecf977231b05a401ca6393d3b7ef8

  • SHA1

    bad37c38b204d8e965e2d58e37920d18266e163c

  • SHA256

    45245cfb80fc049dbf862f7e2e23eebcda2a0d52c8e8ecdcb47a41a4760fd5a9

  • SHA512

    9a6da586643c0c4ea4983c7aacbe2ea68d5ee8b861ea68698d9cb150caf3f1b7e512250bc568c08367d7714b15e5d883c46280b567fdd9f13c0cac56c3f754db

Malware Config

Targets

    • Target

      ubuntu.sh

    • Size

      608B

    • MD5

      0a8ecf977231b05a401ca6393d3b7ef8

    • SHA1

      bad37c38b204d8e965e2d58e37920d18266e163c

    • SHA256

      45245cfb80fc049dbf862f7e2e23eebcda2a0d52c8e8ecdcb47a41a4760fd5a9

    • SHA512

      9a6da586643c0c4ea4983c7aacbe2ea68d5ee8b861ea68698d9cb150caf3f1b7e512250bc568c08367d7714b15e5d883c46280b567fdd9f13c0cac56c3f754db

    • OS Credential Dumping

      Adversaries may attempt to dump credentials to use it in password cracking.

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Checks mountinfo of local process

      Checks mountinfo of running processes which indicate if it is running in chroot jail.

    • Deletes log files

      Deletes log files on the system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Write file to user bin folder

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks