Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea
-
Size
666KB
-
Sample
230822-kxpnlacf9x
-
MD5
8645a413332f840e925bac3cf19ceb57
-
SHA1
87ca0cd2e1c04c2437d302f2864d1e68ea991677
-
SHA256
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea
-
SHA512
ac23c7f28deb3700847bcbf3305e1d6ef133d8ecb45010092024d696ba3839ea53aeee87077f3efc88f9d933673a7147edb862c2ac5636f9f63c3809a557625e
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulAFC9+m:dd35lDbKDIwWUDyqS5omMC9+
Behavioral task
behavioral1
Sample
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Targets
-
-
Target
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea
-
Size
666KB
-
MD5
8645a413332f840e925bac3cf19ceb57
-
SHA1
87ca0cd2e1c04c2437d302f2864d1e68ea991677
-
SHA256
ac81418b0b932a228d2312e0fb78c8e427e71560a413f702528127c7a59640ea
-
SHA512
ac23c7f28deb3700847bcbf3305e1d6ef133d8ecb45010092024d696ba3839ea53aeee87077f3efc88f9d933673a7147edb862c2ac5636f9f63c3809a557625e
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulAFC9+m:dd35lDbKDIwWUDyqS5omMC9+
-
MedusaLocker payload
-
Renames multiple (187) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (289) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2