Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
3B8A2BCD9E8DD805793CC95C74D30F20EBC5714EA249D165AFAC29D1F3B0ACE0.bat
-
Size
1.3MB
-
Sample
250211-hfs9cayrht
-
MD5
659dc2c8af5180c5465f0e04e7334aed
-
SHA1
a3e075c9d36c0077471f7034696af4c660630d9b
-
SHA256
3b8a2bcd9e8dd805793cc95c74d30f20ebc5714ea249d165afac29d1f3b0ace0
-
SHA512
fc632f58f30f6170387c1eb003c3b43656de2f9f97bc4564f00ac5b8a9e4fd1348f2448a07439b32c7e34c3a2020f36cce15aa85bf5f9e7f3a146ac8be431025
-
SSDEEP
24576:7RPcg9zh88jZh8Domk9NGL9oj2cZhm5gbwj0VaIx/a53/RI2g+B5i4/c3B:1Pcbc3rG5oj2cZhMg9/yqqqB
Static task
static1
Behavioral task
behavioral1
Sample
3B8A2BCD9E8DD805793CC95C74D30F20EBC5714EA249D165AFAC29D1F3B0ACE0.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3B8A2BCD9E8DD805793CC95C74D30F20EBC5714EA249D165AFAC29D1F3B0ACE0.bat
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\3D Objects\FILE RECOVERY.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
3B8A2BCD9E8DD805793CC95C74D30F20EBC5714EA249D165AFAC29D1F3B0ACE0.bat
-
Size
1.3MB
-
MD5
659dc2c8af5180c5465f0e04e7334aed
-
SHA1
a3e075c9d36c0077471f7034696af4c660630d9b
-
SHA256
3b8a2bcd9e8dd805793cc95c74d30f20ebc5714ea249d165afac29d1f3b0ace0
-
SHA512
fc632f58f30f6170387c1eb003c3b43656de2f9f97bc4564f00ac5b8a9e4fd1348f2448a07439b32c7e34c3a2020f36cce15aa85bf5f9e7f3a146ac8be431025
-
SSDEEP
24576:7RPcg9zh88jZh8Domk9NGL9oj2cZhm5gbwj0VaIx/a53/RI2g+B5i4/c3B:1Pcbc3rG5oj2cZhMg9/yqqqB
-
Disables service(s)
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Targetcompany family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3628) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
System Services
2Service Execution
2Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Indicator Removal
2File Deletion
2Discovery
Network Share Discovery
1Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1