Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    186vv53.exe

  • Size

    156KB

  • Sample

    200713-3tk6yeq2pj

  • MD5

    e2a2cd3182abc1fa95d43c28647351b5

  • SHA1

    513453b5495268026cc5a2b59d115d46eaf51932

  • SHA256

    67e1a7ea77e26a39bedf12493f94a26b902fd557cdaca847c572f3ea85d20e0a

  • SHA512

    bf7dc8ed3036ea8fd7711fc0bdb8d3fbce694b17bd29c7657266c1509adb862258af29ccbf815da5692e4ccacc0d7faccf763f01f15300366fe513b236156b63

Malware Config

Extracted

Path

\??\M:\Boot\cs-CZ\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL

http://helpqvrg3cc5mvb3.onion/

Targets

    • Target

      186vv53.exe

    • Size

      156KB

    • MD5

      e2a2cd3182abc1fa95d43c28647351b5

    • SHA1

      513453b5495268026cc5a2b59d115d46eaf51932

    • SHA256

      67e1a7ea77e26a39bedf12493f94a26b902fd557cdaca847c572f3ea85d20e0a

    • SHA512

      bf7dc8ed3036ea8fd7711fc0bdb8d3fbce694b17bd29c7657266c1509adb862258af29ccbf815da5692e4ccacc0d7faccf763f01f15300366fe513b236156b63

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks