Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    4b56777a9b8ff644e481b612a41fc34e0030f4bae95d61d5638917d4519ffd78.zip

  • Size

    525KB

  • Sample

    250319-c9by9s1wat

  • MD5

    66df0406e8fbd117b02bf0d3f3f5c2ab

  • SHA1

    1e1d5e1ae7925150c4a9cfe5f5a1019b92f3519f

  • SHA256

    4b56777a9b8ff644e481b612a41fc34e0030f4bae95d61d5638917d4519ffd78

  • SHA512

    9b97727ac3cd65a602e30713d416c562a3f116ae88fd86d410d612e51d6b476f7522d3a7024da2663b9d1b7c629aed02ec334b918bdf4530c4f164235d8f3494

  • SSDEEP

    12288:zJ6BFgfbhJwG6mE30fsi8aa+Oi0zrisyrRibj6VzRs:zSFibhJwYEwlqbkRtVzq

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697

Targets

    • Target

      PAYMENT APPLICATION.exe

    • Size

      621KB

    • MD5

      38f235d25e264d4c15c7596bb02d74fb

    • SHA1

      1b61618f9b4a052f6141d001c121dab951400ccd

    • SHA256

      19298835e138f870193c12029158ec18ce6d1d4c5ec12372d533eaf855c0e7f0

    • SHA512

      6620e78413cc2e2447a08362969ceb7239306b373e45f5ffb84d1628e85f0ca72cfcadd374f26437c6a82fa1d19c6d2eea8fddf1f1ea6a64fe001fde857d46c4

    • SSDEEP

      12288:mQ07P9cnYUV833cfs0d4Rvo6ryCsyr0gM1cJP2:e7PWYUO349mRvTy7kJM1YP2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks