Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    specifications.exe

  • Size

    483KB

  • Sample

    240910-c359javbke

  • MD5

    4629d0dc92bb4c7c1b1beb0ffb8d9989

  • SHA1

    dd016d266c083b9a91ccd29962c57c00201c9262

  • SHA256

    77e5bef9aaab4a5b63dbaa9619266b483fc8fdfb99d73b9cdab6d9d0e986ebd9

  • SHA512

    7ce6c52d4a0c794dd144b68fbb0d2b15b87be6e64a3fa99005157812e587b872d2ee34a1dc8b143a4814ae46d6c7a323b538d36e5042a8caffb0a36b12de49b4

  • SSDEEP

    12288:y8G1KBsy2Mu8AORD8+V8HYSNhukvRZHaBhSUdZovH5UPm:2YB0npHYSlhMZs5Ue

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    alphagasea.com
  • Port:
    587
  • Username:
    john.maina@alphagasea.com
  • Password:
    welding123*
  • Email To:
    management.h2gengroup@skiff.com

Targets

    • Target

      specifications.exe

    • Size

      483KB

    • MD5

      4629d0dc92bb4c7c1b1beb0ffb8d9989

    • SHA1

      dd016d266c083b9a91ccd29962c57c00201c9262

    • SHA256

      77e5bef9aaab4a5b63dbaa9619266b483fc8fdfb99d73b9cdab6d9d0e986ebd9

    • SHA512

      7ce6c52d4a0c794dd144b68fbb0d2b15b87be6e64a3fa99005157812e587b872d2ee34a1dc8b143a4814ae46d6c7a323b538d36e5042a8caffb0a36b12de49b4

    • SSDEEP

      12288:y8G1KBsy2Mu8AORD8+V8HYSNhukvRZHaBhSUdZovH5UPm:2YB0npHYSlhMZs5Ue

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.