Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25.exe

  • Size

    71KB

  • Sample

    221221-wdfgcsfh4t

  • MD5

    b3f5d8a881bf8c1c0431cb6b9747918f

  • SHA1

    7c2b61a227133ce76c2b2fa95945c82647cfb5fc

  • SHA256

    91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25

  • SHA512

    1872ab6ecf9fd7035472a51f4eba681e26674532d0a86604bdee8c77c33234426aaf90b02c572572c412482f19f81388f2110787bb2fa04b04be08308a54e15b

  • SSDEEP

    768:HnI8FVk+TrPonxlCpMZTJcNGsryeqpNaO4izP2UCXkwdbA/aNtGBVsKB/sQ7cF9R:oo+6PikSZl7e6rW0wdbAyNcQDmnZS

Score
10/10

Malware Config

Extracted

Path

\??\M:\How To Restore Your Files.txt

Ransom Note
----------- [ Hello! ] -------------> ****BY DATAF L**OCKER**** What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to contact us? ---------------------------------------------- Using TOR Browser ( https://www.torproject.org/download/ ): tor chat: http://453aluxcu5vgxm4nqqui4ubbzoa5menbb4dyw3nc2rceqqgy7ms5grid.onion/hZwKUVTZ644VCbE3-19k login: User_3hfMgnKTFyQ_Vg== Password: QeimbBce7G8OBEh0pXkUCnyjPrM= ---------------------------------------------- !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!
URLs

http://453aluxcu5vgxm4nqqui4ubbzoa5menbb4dyw3nc2rceqqgy7ms5grid.onion/hZwKUVTZ644VCbE3-19k

Targets

    • Target

      91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25.exe

    • Size

      71KB

    • MD5

      b3f5d8a881bf8c1c0431cb6b9747918f

    • SHA1

      7c2b61a227133ce76c2b2fa95945c82647cfb5fc

    • SHA256

      91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25

    • SHA512

      1872ab6ecf9fd7035472a51f4eba681e26674532d0a86604bdee8c77c33234426aaf90b02c572572c412482f19f81388f2110787bb2fa04b04be08308a54e15b

    • SSDEEP

      768:HnI8FVk+TrPonxlCpMZTJcNGsryeqpNaO4izP2UCXkwdbA/aNtGBVsKB/sQ7cF9R:oo+6PikSZl7e6rW0wdbAyNcQDmnZS

    Score
    10/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks