Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    PO- 102022.exe

  • Size

    779KB

  • Sample

    221019-ggv9naegg6

  • MD5

    e6af60a6a93d2457c1c9996b03c17f33

  • SHA1

    ba99505bb4d23d702ca57431667aead9968a5095

  • SHA256

    ae3f2de164a5055667a0bceed12a42dcad9cc018e3854840f650686474359983

  • SHA512

    063b8f98a0cb6a1192f0e0ab41085ea7f524fe383d54cae1518c1a502105fe056249c139bb4377d4adb28e2e534e3d0229e9c377b3d5c103ba3978955440420f

  • SSDEEP

    12288:D+rpJhwjSZ6DHi85Bn0JpRBihpj+n04jVK4Tcxq/UMCSfyR4sVMYoL:qijSF85BnOp+jeaq/UMCFisV

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PO- 102022.exe

    • Size

      779KB

    • MD5

      e6af60a6a93d2457c1c9996b03c17f33

    • SHA1

      ba99505bb4d23d702ca57431667aead9968a5095

    • SHA256

      ae3f2de164a5055667a0bceed12a42dcad9cc018e3854840f650686474359983

    • SHA512

      063b8f98a0cb6a1192f0e0ab41085ea7f524fe383d54cae1518c1a502105fe056249c139bb4377d4adb28e2e534e3d0229e9c377b3d5c103ba3978955440420f

    • SSDEEP

      12288:D+rpJhwjSZ6DHi85Bn0JpRBihpj+n04jVK4Tcxq/UMCSfyR4sVMYoL:qijSF85BnOp+jeaq/UMCFisV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks