Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    POForBulkOrder.zip

  • Size

    46KB

  • Sample

    250318-v7ftjswtas

  • MD5

    a16b5fa42b383463a38e440d00997292

  • SHA1

    0650761cf289e55fc0440b1427aa1c2bd0fc2abc

  • SHA256

    93a444b70020daf99ae1adfccab334e8f5afdf2520276a51acb420221790b462

  • SHA512

    525269839ced0f9d88ad3409e9df2c9b81d3edf69fda75c0e7586310d472e53f2ac70b99cab535c807f9415cc7dc354e689b65dfeff811c52f3e4031c6d8b27f

  • SSDEEP

    768:eJR6mod1i886GWZQDssr2J4u8PeFXSCiCbuHLx6+D0cK2HwWziPP7ys9eK5PTxLL:VBD8iZQDsEZWSCiRLacHHwWziX79eKVd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7876749337:AAF0i4ZoyGf4tE2zVqihoZaQsewrLTGkYe8/sendMessage?chat_id=6784063670

Targets

    • Target

      PO For Bulk Order.exe

    • Size

      130KB

    • MD5

      49b723e92320ed5be3902df58406f4a9

    • SHA1

      9097bba4ae0bcd0e960c31ad70ed11574ef04af9

    • SHA256

      535d13f891e2647db7b85125f67782ae1fedfa5e2664bf2c19d868a9ca16e76f

    • SHA512

      464bcd48874dc48c901a7ff06231a8a9fefa2fedc0c3d10b6a1f88221446426fa312b1bee04a1c79870013f0938825565d810276c97aa63e6e647856602f96b4

    • SSDEEP

      3072:z99yINAgKjV545jbvk5Hbe7fMuJN07TC7F88KLQUP86Akb53SoQlmWvIwvcXVQg0:OINAgKjV5Cjbvk5Hbe7fMuJN07TJbRS4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks