Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
pay in slip.doc
-
Size
24KB
-
Sample
230320-vf9bsagf2v
-
MD5
67813a427b895283130f351eda676413
-
SHA1
7435c8fd33692e4de5c64d326c7979145eab8c52
-
SHA256
b03ee24844c713545b3cbd37981db041423a1719d8d9faf596cdd8ddad7dc50f
-
SHA512
f6edf2b0f8a06a2f722c2373ecb11aa5c6a303791f288abeaf23c5c87923302ee6f3ca35ed210f2638dba416271352511da392edd27d05af361fc04daceb17c7
-
SSDEEP
768:7Fx0XaIsnPRIa4fwJMeQhMBW8BKwr4PFio:7f0Xvx3EMRhkKwQJ
Static task
static1
Behavioral task
behavioral1
Sample
pay in slip.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pay in slip.rtf
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
pay in slip.doc
-
Size
24KB
-
MD5
67813a427b895283130f351eda676413
-
SHA1
7435c8fd33692e4de5c64d326c7979145eab8c52
-
SHA256
b03ee24844c713545b3cbd37981db041423a1719d8d9faf596cdd8ddad7dc50f
-
SHA512
f6edf2b0f8a06a2f722c2373ecb11aa5c6a303791f288abeaf23c5c87923302ee6f3ca35ed210f2638dba416271352511da392edd27d05af361fc04daceb17c7
-
SSDEEP
768:7Fx0XaIsnPRIa4fwJMeQhMBW8BKwr4PFio:7f0Xvx3EMRhkKwQJ
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-