Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    b01dff27adffe5c43253bb33fb78b40f3bbb9853a510ee978abb821c38ffced0.exe

  • Size

    2.3MB

  • Sample

    250311-e6e8mastdz

  • MD5

    6fc6164b3a08669992acad3764fb1922

  • SHA1

    e99c667e338dfeee60e7bd5c2c7848a351c67114

  • SHA256

    b01dff27adffe5c43253bb33fb78b40f3bbb9853a510ee978abb821c38ffced0

  • SHA512

    716bd8bdd358d2251cde981697c8a4f473a6f4294287e75366be7d8e86ee70feeed513a6310a6ce953a3814648f56f9ebb830c08a8420b06604a90df1c28b328

  • SSDEEP

    49152:emWMASox0K6ZlCF4k9oT7J9L3jjS7W55H:emXtox7ag/a7J9L

Malware Config

Extracted

Family

agenda

Credentials
  • Username:
    sysadmin@ashminlc
  • Password:
    Pa55w0rd123
Attributes
  • company_id

    quQkrKaqTs

  • note

    -- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note. All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note. -- Credentials Extension: quQkrKaqTs Domain: aqfe4f3zqb5luwgkbnxycfxdeqjgnuhsjfiqf6wxnohamich7a6nqnyd.onion login: B5zd2EBjH7iqZratqg2V4pzWeYcBSsGw password:

rsa_privkey.plain

Targets

    • Target

      b01dff27adffe5c43253bb33fb78b40f3bbb9853a510ee978abb821c38ffced0.exe

    • Size

      2.3MB

    • MD5

      6fc6164b3a08669992acad3764fb1922

    • SHA1

      e99c667e338dfeee60e7bd5c2c7848a351c67114

    • SHA256

      b01dff27adffe5c43253bb33fb78b40f3bbb9853a510ee978abb821c38ffced0

    • SHA512

      716bd8bdd358d2251cde981697c8a4f473a6f4294287e75366be7d8e86ee70feeed513a6310a6ce953a3814648f56f9ebb830c08a8420b06604a90df1c28b328

    • SSDEEP

      49152:emWMASox0K6ZlCF4k9oT7J9L3jjS7W55H:emXtox7ag/a7J9L

    • Agenda Ransomware

      A ransomware with multiple variants written in Golang and Rust first seen in August 2022.

    • Agenda family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks