Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe

  • Size

    641KB

  • Sample

    250202-dgdststqaq

  • MD5

    7f84318e750fcb83738f9ad23bbecfe8

  • SHA1

    45039f494513cc91bc0ef398c013989cde717673

  • SHA256

    39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44

  • SHA512

    397c344da1a1d631ca2e6e00db3fa5f04cf12de74324bf84cbb60abfa4ede5ad45175af2639abba1375d990a76d3cb685e06138bde34ddb70f652682c3dd9b2d

  • SSDEEP

    12288:xOFtByqfpHJJdgib+TCUIGr8ocdn3+2SF2SOd:xKI0ppJJ+ToncSd

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    somac@gdmaduanas.com
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe

    • Size

      641KB

    • MD5

      7f84318e750fcb83738f9ad23bbecfe8

    • SHA1

      45039f494513cc91bc0ef398c013989cde717673

    • SHA256

      39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44

    • SHA512

      397c344da1a1d631ca2e6e00db3fa5f04cf12de74324bf84cbb60abfa4ede5ad45175af2639abba1375d990a76d3cb685e06138bde34ddb70f652682c3dd9b2d

    • SSDEEP

      12288:xOFtByqfpHJJdgib+TCUIGr8ocdn3+2SF2SOd:xKI0ppJJ+ToncSd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.