Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/06/2024, 06:51

240612-hmt48atbnf 10

12/05/2024, 13:36

240512-qwmqhagg7z 10

General

  • Target

    2024-05-12_9d1fd92ea00c6eef88076dd55cad611e_snatch

  • Size

    5.4MB

  • Sample

    240512-qwmqhagg7z

  • MD5

    9d1fd92ea00c6eef88076dd55cad611e

  • SHA1

    a108c142dba8c9af5236ec64fe5a1ce04c54a3fb

  • SHA256

    8badf1274da7c2bd1416e2ff8c384348fc42e7d1600bf826c9ad695fb5192c74

  • SHA512

    5a3a4806e3e5752537185cdd467385f4bd693f0bf8650f9f0c0e6b742a39ea8d5f4bb98a63f9da89c55947fc80b707640be4344ea04a4dddb62f01548615e1e4

  • SSDEEP

    49152:cSHZzXZ9Xrb/TWvO90d7HjmAFd4A64nsfJNpqVVVTZwJbwao2gkATs4hVl/YhpE4:PZ91ErwJ3CJE3/R4

Score
10/10

Malware Config

Extracted

Path

C:\Users\Public\Desktop\HOW_RETURN_YOUR_DATA.TXT

Ransom Note
To the board of directors. Your network has been attacked through various vulnerabilities found in your system. We have gained full access to the entire network infrastructure. All your confidential information about all employees and all partners and developments has been downloaded to our servers and is located with us. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- Our team has an extensive background in legal and so called white hat hacking. However, clients usually considered the found vulnerabilities to be minor and poorlyr\n paid for our services. So we decided to change our business model. Now you understand how important it isr\n to allocate a good budget for IT security. This is serious business for us and we really don't want to ruin your privacy,r\n reputation and a company. We just want to get paid for our work whist finding vulnerabilities in various networks. Your files are currently encrypted with our tailor made state of the art algorithm. Don't try to terminate unknown processes, don't shutdown the servers, do not unplug drives, all this can lead to partial or complete data loss. We have also managed to download a large amount of various, crucial data from your network. A complete list of files and samples will be provided upon request. We can decrypt a couple of files for free. The size of each file must be no more than 5 megabytes. All your data will be successfully decrypted immediately after your payment. You will also receive a detailed list of vulnerabilities used to gain access to your network. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- If you refuse to cooperate with us, it will lead to the following consequences for your company: 1. All data downloaded from your network will be published for free or even sold 2. Your system will be re-attacked continuously, now that we know all your weak spotsr 3. We will also attack your partners and suppliers using info obtained from your network 4. It can lead to legal actions against you for data breaches +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- !!!!Instructions for contacting our team!!!! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- ---> Download and install TOR browser from this site : https://torproject.org ---> For contact us via LIVE CHAT open our website : http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/Url=af1a0dc5-febd-4b19-bdf6-8d809756db71 ---> If Tor is restricted in your area, use VPN ---> All your Data will be published in 7 Days if NO contact made ---> Your Decryption keys will be permanently destroyed in 3 Days if no contact made ---> Your Data will be published if you will hire third-party negotiators to contact us
URLs

http://panelqbinglxczi2gqkwderfvgq6bcv5cbjwxrksjtvr5xv7ozh5wqad.onion/Url=af1a0dc5-febd-4b19-bdf6-8d809756db71

Targets

    • Target

      2024-05-12_9d1fd92ea00c6eef88076dd55cad611e_snatch

    • Size

      5.4MB

    • MD5

      9d1fd92ea00c6eef88076dd55cad611e

    • SHA1

      a108c142dba8c9af5236ec64fe5a1ce04c54a3fb

    • SHA256

      8badf1274da7c2bd1416e2ff8c384348fc42e7d1600bf826c9ad695fb5192c74

    • SHA512

      5a3a4806e3e5752537185cdd467385f4bd693f0bf8650f9f0c0e6b742a39ea8d5f4bb98a63f9da89c55947fc80b707640be4344ea04a4dddb62f01548615e1e4

    • SSDEEP

      49152:cSHZzXZ9Xrb/TWvO90d7HjmAFd4A64nsfJNpqVVVTZwJbwao2gkATs4hVl/YhpE4:PZ91ErwJ3CJE3/R4

    Score
    10/10
    • Renames multiple (163) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks