Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    dab5bce27a9d25f219566fa7d17762c6_JaffaCakes118

  • Size

    667KB

  • Sample

    240911-tfjkpayhrk

  • MD5

    dab5bce27a9d25f219566fa7d17762c6

  • SHA1

    338959d2a56613ff7d60e378cd570716cc155121

  • SHA256

    5b77c17c1bb413e5d87843c960f67152fd4e6f558efbc8ad778a93b88e115c69

  • SHA512

    09596bc46c5cf5c572f2432a26844bdac591075b39c423c720f0c6bf88baa3fefa88c3ea84c103579aaafe483b401162559e144d340eb6f89ee9e6d7ea84f6cc

  • SSDEEP

    12288:Q2SR/SQVieUY3JMpEUmM05n8xYVeoQeH0GYAZnrehql:qR/SQVi7Y3JMdyn8GseH0ytris

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1335107831:AAGZPoo67JukV78LJI16BeQqy3whx-zI59g/sendMessage?chat_id=1294593001

Targets

    • Target

      dab5bce27a9d25f219566fa7d17762c6_JaffaCakes118

    • Size

      667KB

    • MD5

      dab5bce27a9d25f219566fa7d17762c6

    • SHA1

      338959d2a56613ff7d60e378cd570716cc155121

    • SHA256

      5b77c17c1bb413e5d87843c960f67152fd4e6f558efbc8ad778a93b88e115c69

    • SHA512

      09596bc46c5cf5c572f2432a26844bdac591075b39c423c720f0c6bf88baa3fefa88c3ea84c103579aaafe483b401162559e144d340eb6f89ee9e6d7ea84f6cc

    • SSDEEP

      12288:Q2SR/SQVieUY3JMpEUmM05n8xYVeoQeH0GYAZnrehql:qR/SQVi7Y3JMdyn8GseH0ytris

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks