Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    f1f3fddcea2b7d98617aae0707c5bcaf6ea354498b3e77a8810c0cce702040b9.exe

  • Size

    5.0MB

  • Sample

    250310-t82lza1zex

  • MD5

    d1c331c17ddd4abe0d53755461c1ec9a

  • SHA1

    53fb91be6a6ccc4b18bb75f751263896fed1a640

  • SHA256

    f1f3fddcea2b7d98617aae0707c5bcaf6ea354498b3e77a8810c0cce702040b9

  • SHA512

    4003ba7aacccacd5ba050fee1976b814da20aff907d6189367c318339ba0fcf11b8df4574f4dda62acee85c5e9d5ce7c63b9b8af14187af821252c1261b34657

  • SSDEEP

    98304:FjEJBH5Te5ulALA0QbJq1GqHuFzFS3ajF39oS0B9SM7Y:FjEJBH5TXALBQbqgcajF39oSI9SC

Malware Config

Extracted

Family

agenda

Credentials
Attributes
  • company_id

    -C9QzkIMPq

  • note

    -- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog (http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion) and on the media page (https://31.41.244.100) Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials-- Credentials Extension: -C9QzkIMPq Domain: 5kw3qwr527czhqx7hc5vsvbrewcsocpfkr2ndcxlcmvp5boal6j3rdqd.onion login: -h6X9Y_VM1tIs0JacQ7rv5T26pLEOGv0 password:

rsa_pubkey.plain

Targets

    • Target

      f1f3fddcea2b7d98617aae0707c5bcaf6ea354498b3e77a8810c0cce702040b9.exe

    • Size

      5.0MB

    • MD5

      d1c331c17ddd4abe0d53755461c1ec9a

    • SHA1

      53fb91be6a6ccc4b18bb75f751263896fed1a640

    • SHA256

      f1f3fddcea2b7d98617aae0707c5bcaf6ea354498b3e77a8810c0cce702040b9

    • SHA512

      4003ba7aacccacd5ba050fee1976b814da20aff907d6189367c318339ba0fcf11b8df4574f4dda62acee85c5e9d5ce7c63b9b8af14187af821252c1261b34657

    • SSDEEP

      98304:FjEJBH5Te5ulALA0QbJq1GqHuFzFS3ajF39oS0B9SM7Y:FjEJBH5TXALBQbqgcajF39oSI9SC

    • Agenda Ransomware

      A ransomware with multiple variants written in Golang and Rust first seen in August 2022.

    • Agenda family

MITRE ATT&CK Enterprise v15

Tasks