Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4.exe
-
Size
5.0MB
-
Sample
250310-ttqads1kx6
-
MD5
1bde76f3197123dcc2ecd0bfef567484
-
SHA1
d3fbba0085e1f0ac3aee8549a789d5e00eee5da3
-
SHA256
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4
-
SHA512
ab15c6b4c093c3351a84a4d6d27f57e3fc6df5cb58423fe3a5d9e38c57b647591662690b697ceb7e5f82dbeaec6a1fb2de7844c4115e159e683af2930e734b2e
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQVL:DtFvfPs+icB74XhJmqb7OKIbSe
Static task
static1
Behavioral task
behavioral1
Sample
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenda
- Username:
[email protected] - Password:
p21816
- Username:
[email protected] - Password:
oradwh
- Username:
[email protected] - Password:
1bimbor8
- Username:
[email protected] - Password:
Cluster2
-
company_id
rZZihBNaJ0
-
note
-- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. From:10.0.201.164#10.0.201.247#10.0.201.212#10.0.201.111 about 1T+ Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) if we do not receive any reply from you, we will proceed with the data release process and inform your customers that you and your company may face regulatory penalties, customer lawsuits, a collapse in reputation, and complete system failure to recover, which could have a very adverse impact on you Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note. All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note. -- Credentials Extension: rZZihBNaJ0 Domain: qxeabmomf6qymsg7sy5i26i72255zljsi7bv7asowbbw5oqwkahbkfad.onion login: WRefa9HaXdsJOob3gZdGggwf07v492FG password:
Targets
-
-
Target
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4.exe
-
Size
5.0MB
-
MD5
1bde76f3197123dcc2ecd0bfef567484
-
SHA1
d3fbba0085e1f0ac3aee8549a789d5e00eee5da3
-
SHA256
9ad5ad02572a10586241cd551dc0155e0f602222916a460c5cdaa9b48a178ec4
-
SHA512
ab15c6b4c093c3351a84a4d6d27f57e3fc6df5cb58423fe3a5d9e38c57b647591662690b697ceb7e5f82dbeaec6a1fb2de7844c4115e159e683af2930e734b2e
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQVL:DtFvfPs+icB74XhJmqb7OKIbSe
Score10/10-
Agenda Ransomware
A ransomware with multiple variants written in Golang and Rust first seen in August 2022.
-
Agenda family
-