Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SERVICEPURCHASEORDER.zip

  • Size

    46KB

  • Sample

    250318-wax71awtcv

  • MD5

    f784dad638b8ddaaa7b00fae276b9537

  • SHA1

    325383081f2c51d96ead44641733545f0a18fd17

  • SHA256

    35840d05f7fb9a177ab443232bc18cde83c619401173ca72f1310097248d64c7

  • SHA512

    959ab226ed722b96077caa9095f6f0d0ccce82b1e3167ceaae1d2e945a36ecbc11c95631275081f7bdaf9c884544225a214281b46445ed5e8692c523d3238fc1

  • SSDEEP

    768:BJR6mod1i886GWZQDssr2J4u8PeFXSCiCbuHLx6+D0cK2HwWziPP7ys9eK5PTxLc:EBD8iZQDsEZWSCiRLacHHwWziX79eKVG

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7876749337:AAF0i4ZoyGf4tE2zVqihoZaQsewrLTGkYe8/sendMessage?chat_id=6784063670

Targets

    • Target

      SERVICE PURCHASE ORDER.exe

    • Size

      130KB

    • MD5

      49b723e92320ed5be3902df58406f4a9

    • SHA1

      9097bba4ae0bcd0e960c31ad70ed11574ef04af9

    • SHA256

      535d13f891e2647db7b85125f67782ae1fedfa5e2664bf2c19d868a9ca16e76f

    • SHA512

      464bcd48874dc48c901a7ff06231a8a9fefa2fedc0c3d10b6a1f88221446426fa312b1bee04a1c79870013f0938825565d810276c97aa63e6e647856602f96b4

    • SSDEEP

      3072:z99yINAgKjV545jbvk5Hbe7fMuJN07TC7F88KLQUP86Akb53SoQlmWvIwvcXVQg0:OINAgKjV5Cjbvk5Hbe7fMuJN07TJbRS4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks