Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SKM37891098 pdf.exe

  • Size

    938KB

  • Sample

    230509-hccr7aee85

  • MD5

    dbb8ee14bfc39cac3c4b224ce08abdbe

  • SHA1

    d0781ca32fbf607a6d5f4e791b59883881bd2178

  • SHA256

    5c613c7403edd5e27a26a3f5aec588ce9c75806a9ce7892ff6fdfc615f80367e

  • SHA512

    b80d54d80330c2c0def6b4573e3e867111a4c998c58d1dfd930a9713c964aaab519b62a6193a439195557513d78accf7f6d680c7a1748684657a87a1fe4b57a4

  • SSDEEP

    24576:vplfkrl84la+DFBN445l6LbowIRtAfyTI:vHMrl8GnNF6LEwUyq

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596

Targets

    • Target

      SKM37891098 pdf.exe

    • Size

      938KB

    • MD5

      dbb8ee14bfc39cac3c4b224ce08abdbe

    • SHA1

      d0781ca32fbf607a6d5f4e791b59883881bd2178

    • SHA256

      5c613c7403edd5e27a26a3f5aec588ce9c75806a9ce7892ff6fdfc615f80367e

    • SHA512

      b80d54d80330c2c0def6b4573e3e867111a4c998c58d1dfd930a9713c964aaab519b62a6193a439195557513d78accf7f6d680c7a1748684657a87a1fe4b57a4

    • SSDEEP

      24576:vplfkrl84la+DFBN445l6LbowIRtAfyTI:vHMrl8GnNF6LEwUyq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks