Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    tmp

  • Size

    1.0MB

  • Sample

    221005-js9brsdff4

  • MD5

    00839478c6c86d747952b11217b1ad98

  • SHA1

    bc363604aac42b10f0106f28cd53a85fa03dea08

  • SHA256

    beb581aaec97ca8d00d79699577849cd46a8e25561e29e906a1adb254ffc2549

  • SHA512

    4eb303459709b64c06838f6c8ffa936c88839df01b976e0c058c2ba687bcd6df2e50282a0145929f76abd5cf9cfc3b7983eb6f5b32803b68897ac942caf407d2

  • SSDEEP

    24576:BxZ81WYVrrukMf7KKWx/ekX3kmIGQP7EBtwyLl:XZ8cTkMfe/eU0fjEjwyL

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      tmp

    • Size

      1.0MB

    • MD5

      00839478c6c86d747952b11217b1ad98

    • SHA1

      bc363604aac42b10f0106f28cd53a85fa03dea08

    • SHA256

      beb581aaec97ca8d00d79699577849cd46a8e25561e29e906a1adb254ffc2549

    • SHA512

      4eb303459709b64c06838f6c8ffa936c88839df01b976e0c058c2ba687bcd6df2e50282a0145929f76abd5cf9cfc3b7983eb6f5b32803b68897ac942caf407d2

    • SSDEEP

      24576:BxZ81WYVrrukMf7KKWx/ekX3kmIGQP7EBtwyLl:XZ8cTkMfe/eU0fjEjwyL

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks