Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe
-
Size
5.0MB
-
Sample
250311-epx24s1xet
-
MD5
a6302fdb63e2244c1246a73a7d65d09e
-
SHA1
0711949aab58c1b051b388d89db388db2b047feb
-
SHA256
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f
-
SHA512
0628dad85e2185e25142c126667b9213c3a6611e44b8317499e52027bc3a0c6e0865a0861ec20d1381b393caba076046e85666f2b896bfa199928f57825836a3
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQV:DtFvfPs+icB74XhJmqb7OKIbS
Static task
static1
Behavioral task
behavioral1
Sample
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenda
- Username:
[email protected] - Password:
p21816
- Username:
[email protected] - Password:
oradwh
- Username:
[email protected] - Password:
1bimbor8
- Username:
[email protected] - Password:
Cluster2
-
company_id
rZZihBNaJ0
-
note
-- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. From:10.0.201.164#10.0.201.247#10.0.201.212#10.0.201.111 about 1T+ Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) if we do not receive any reply from you, we will proceed with the data release process and inform your customers that you and your company may face regulatory penalties, customer lawsuits, a collapse in reputation, and complete system failure to recover, which could have a very adverse impact on you Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note. All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note. -- Credentials Extension: rZZihBNaJ0 Domain: qxeabmomf6qymsg7sy5i26i72255zljsi7bv7asowbbw5oqwkahbkfad.onion login: WRefa9HaXdsJOob3gZdGggwf07v492FG password:
Targets
-
-
Target
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe
-
Size
5.0MB
-
MD5
a6302fdb63e2244c1246a73a7d65d09e
-
SHA1
0711949aab58c1b051b388d89db388db2b047feb
-
SHA256
92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f
-
SHA512
0628dad85e2185e25142c126667b9213c3a6611e44b8317499e52027bc3a0c6e0865a0861ec20d1381b393caba076046e85666f2b896bfa199928f57825836a3
-
SSDEEP
49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQV:DtFvfPs+icB74XhJmqb7OKIbS
Score10/10-
Agenda Ransomware
A ransomware with multiple variants written in Golang and Rust first seen in August 2022.
-
Agenda family
-