Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
VHO-Trojan-Ransom.Win32.Hive.dc-d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33.7z
-
Size
902KB
-
Sample
250313-v8236sytgw
-
MD5
71bda678e703bdb64bcd3316b1c5ef71
-
SHA1
8345a18f2a2d75f0a77f03562ed7856c2dcd038b
-
SHA256
1dfccde2de5ee587770c66f98d39e9fdeab1c8c8d016c852bd4891a6076999ee
-
SHA512
cd1abb60a56992a19c90251968f6adb1dd9406c33a635dd04d1b594e00415baaabfb0e6d4b8a57e50a23c746d4822f8e858bb833476afc278edbddc44a497319
-
SSDEEP
24576:aWMQs2b3eFviBqj9T5NmvJe6xA99zwkNKptNIu:O2beFviBEtNmvs6xAeksptNIu
Static task
static1
Behavioral task
behavioral1
Sample
VHO-Trojan-Ransom.Win32.Hive.dc-d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VHO-Trojan-Ransom.Win32.Hive.dc-d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
VHO-Trojan-Ransom.Win32.Hive.dc-d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33.exe
-
Size
3.3MB
-
MD5
6c1444d0e1c63881918fdd4d60d54f9d
-
SHA1
408db71f315ae43204f1a34b6f28c5ac51d5507b
-
SHA256
d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33
-
SHA512
bacf08c9d9c93495f01356589249dba5d5b8588acb7f00eb7d92e784875ef9610e37687ff32233c49f862f5564c6cf1fe0643ea8179a3e1be98eec65485525c1
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1R:uVpjK7xWF34fSQSqFvVqpcfE
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4