Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch
-
Size
3.1MB
-
Sample
250312-cjxs2stj13
-
MD5
f5d7efaec3c1274b0aaa704a6caa1671
-
SHA1
ec5c25e1cee1dca5c75baf5a6e3bec69441959dc
-
SHA256
5baa791a0bcaff60080472bfa434631bc7524b8a10989ed6e7b200f010cb8e1d
-
SHA512
dab0a8060e9012706ae6ba46adeb2f18e5edecdc187e856989236dd0edb46ed7912cee97cee1c9fb075724c5d736b07e418991d1a3793bee6770d51618dd607f
-
SSDEEP
49152:imfcJ4D5NnqxkGcfxPxZHPlCJKC732T4rOB3IJ2LL8JcL8LBetlyQ1D11:imfcO1Nq6GcfRdF
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Program Files\GyDM_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch
-
Size
3.1MB
-
MD5
f5d7efaec3c1274b0aaa704a6caa1671
-
SHA1
ec5c25e1cee1dca5c75baf5a6e3bec69441959dc
-
SHA256
5baa791a0bcaff60080472bfa434631bc7524b8a10989ed6e7b200f010cb8e1d
-
SHA512
dab0a8060e9012706ae6ba46adeb2f18e5edecdc187e856989236dd0edb46ed7912cee97cee1c9fb075724c5d736b07e418991d1a3793bee6770d51618dd607f
-
SSDEEP
49152:imfcJ4D5NnqxkGcfxPxZHPlCJKC732T4rOB3IJ2LL8JcL8LBetlyQ1D11:imfcO1Nq6GcfRdF
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4