Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796.exe
-
Size
5.0MB
-
Sample
250311-dnf7jazsdx
-
MD5
2020979e080d7ac9c0403172573c7de8
-
SHA1
878b5dc93dcb0502a51ab191ff5a25c670bf7090
-
SHA256
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796
-
SHA512
99da624c0f5b91f8a3310ba8bd79018891e9f2058d8dc09e14e0b7d82f8387f950e6e71af0c89d459b24e856844d3c5e93c3cb8810ee41a902a7cd81fbf7eb6c
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQVr:DtFvfPs+icB74XhJmqb7OKIbS+
Static task
static1
Behavioral task
behavioral1
Sample
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenda
- Username:
[email protected] - Password:
p21816
- Username:
[email protected] - Password:
oradwh
- Username:
[email protected] - Password:
1bimbor8
- Username:
[email protected] - Password:
Cluster2
-
company_id
rZZihBNaJ0
-
note
-- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. From:10.0.201.164#10.0.201.247#10.0.201.212#10.0.201.111 about 1T+ Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) if we do not receive any reply from you, we will proceed with the data release process and inform your customers that you and your company may face regulatory penalties, customer lawsuits, a collapse in reputation, and complete system failure to recover, which could have a very adverse impact on you Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note. All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note. -- Credentials Extension: rZZihBNaJ0 Domain: qxeabmomf6qymsg7sy5i26i72255zljsi7bv7asowbbw5oqwkahbkfad.onion login: WRefa9HaXdsJOob3gZdGggwf07v492FG password:
Targets
-
-
Target
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796.exe
-
Size
5.0MB
-
MD5
2020979e080d7ac9c0403172573c7de8
-
SHA1
878b5dc93dcb0502a51ab191ff5a25c670bf7090
-
SHA256
4f62e909c14af137dc07d4b990c53bb28fa7c5344966b7b18f157eb235d0d796
-
SHA512
99da624c0f5b91f8a3310ba8bd79018891e9f2058d8dc09e14e0b7d82f8387f950e6e71af0c89d459b24e856844d3c5e93c3cb8810ee41a902a7cd81fbf7eb6c
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQVr:DtFvfPs+icB74XhJmqb7OKIbS+
Score10/10-
Agenda Ransomware
A ransomware with multiple variants written in Golang and Rust first seen in August 2022.
-
Agenda family
-