Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    31012025_0818_30012025_FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.img

  • Size

    88KB

  • Sample

    250131-j7bdaasncp

  • MD5

    669b3179120601e9d9b7acfa0cb99756

  • SHA1

    aed46f29462179cb05a74a2d484f95ed1c1cf444

  • SHA256

    4c577d699400716fdafd50da035d7179bde0a6e0f5d99a881a258f7930395122

  • SHA512

    908b245c7692cd10ed4808d64bdb44fa7edbecebcd7a81d4db5359d7e0fdf832418c4b0da88a45b459d225dbeb971a90bcb251b2b0ee990565be6d7449b5017a

  • SSDEEP

    384:GnwjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:GwHvSPo8gBoV09GW6GAcKxX+

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtps.aruba.it
  • Port:
    465
  • Username:
    hr@tecninf.it
  • Password:
    tecninf2017
  • Email To:
    mpalogz@yandex.com

Targets

    • Target

      FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.exe

    • Size

      26KB

    • MD5

      c4b6e9359dac142bc8669819f9bf6092

    • SHA1

      32e7b0d35ddc72c5781825d303941d5ea17ae828

    • SHA256

      96a7766f5d19b90a2818078ea5d88c40dfa121fd812216cf5cba3b48e0708b79

    • SHA512

      ffc1648f771e4af44dd0327084b301036503c7c5d4f0929b543ed6588a7ff0597e5f6d49f03edea8458ba301f9d6b4f155b7a8de75fb1cf5e410369c51394f97

    • SSDEEP

      384:LjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:LHvSPo8gBoV09GW6GAcKxX+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.