Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    fc6ae69175a3b839356a285e8917cdcd.exe

  • Size

    858KB

  • Sample

    230201-rsz24abh8w

  • MD5

    fc6ae69175a3b839356a285e8917cdcd

  • SHA1

    4df6d0bc48af8c06db5ff8bcd32d8797e6748d54

  • SHA256

    242e3afa42a4b6ecbe015e0d0a2786c42a24167e05a12f380f6e63af24d8c4e2

  • SHA512

    1c319b72454bca09b7c7b34b36d7dce7a768d05a05a77b3cd727887a8fc3c535bb21a4705a2daa18df57098881429ec057ef861daa8465320f691c9bdb12cdd3

  • SSDEEP

    12288:hSaE8R724XFHQOGYiFd07AKcSv8hvtFr8z9i7+pv7c4N34X/4pBFB5r61KAspot4:gP8RacFwHUxc1hvfr8zw6R7c4N34g

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    olgaecs.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    0zukpdS7Pgug

Targets

    • Target

      fc6ae69175a3b839356a285e8917cdcd.exe

    • Size

      858KB

    • MD5

      fc6ae69175a3b839356a285e8917cdcd

    • SHA1

      4df6d0bc48af8c06db5ff8bcd32d8797e6748d54

    • SHA256

      242e3afa42a4b6ecbe015e0d0a2786c42a24167e05a12f380f6e63af24d8c4e2

    • SHA512

      1c319b72454bca09b7c7b34b36d7dce7a768d05a05a77b3cd727887a8fc3c535bb21a4705a2daa18df57098881429ec057ef861daa8465320f691c9bdb12cdd3

    • SSDEEP

      12288:hSaE8R724XFHQOGYiFd07AKcSv8hvtFr8z9i7+pv7c4N34X/4pBFB5r61KAspot4:gP8RacFwHUxc1hvfr8zw6R7c4N34g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks