Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47.exe
-
Size
5.0MB
-
Sample
250311-drhjrsyny6
-
MD5
a7e7d00d531cb7ca27d0f3bee448573f
-
SHA1
9bac4d59b06239ac6e5cf124e3d8bb13a7145547
-
SHA256
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47
-
SHA512
2c11d5837d0ddf637b2712154734875dbe94e7d45b4ce76d636c4e3d91486206dbbd59b2f3b7e98f0db67a491eed10cbbe1710fb24fbe5876f3db5d7d54f1813
-
SSDEEP
98304:fR7x6RHNpZub773UmRAro1DkcKb72ugY9mqGvqXP4W+TsOS:fFwm7IwAro1gVn2uT9mcP9OS
Static task
static1
Behavioral task
behavioral1
Sample
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenda
- Username:
[email protected] - Password:
l2didPH8
-
company_id
yiOZCdFl_T
-
note
-- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials-- Credentials Extension: yiOZCdFl_T Domain: levcqyqo42a6fpzucmuwffav7c7esvy75v3jsluc6ye4clfu6xqkowqd.onion login: VkO_C5cEVOTEQ0HBUbgXQIFFzRbmJ-2x password:
Targets
-
-
Target
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47.exe
-
Size
5.0MB
-
MD5
a7e7d00d531cb7ca27d0f3bee448573f
-
SHA1
9bac4d59b06239ac6e5cf124e3d8bb13a7145547
-
SHA256
55d51a57aa4ae7086e9eff4a33602c03f051464996af419c6c79214fcc04be47
-
SHA512
2c11d5837d0ddf637b2712154734875dbe94e7d45b4ce76d636c4e3d91486206dbbd59b2f3b7e98f0db67a491eed10cbbe1710fb24fbe5876f3db5d7d54f1813
-
SSDEEP
98304:fR7x6RHNpZub773UmRAro1DkcKb72ugY9mqGvqXP4W+TsOS:fFwm7IwAro1gVn2uT9mcP9OS
Score10/10-
Agenda Ransomware
A ransomware with multiple variants written in Golang and Rust first seen in August 2022.
-
Agenda family
-