Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    35c62ecbe0a4b2e1c0253e06a9d800de637e34214edd873f6dc63f02c2175120.zip

  • Size

    501KB

  • Sample

    250319-cxpplavmw2

  • MD5

    6fa5ed5c23f9cd754c38d34413a48b6e

  • SHA1

    9722d1f587b45174166e2806f0ebd896c1f2ce1c

  • SHA256

    35c62ecbe0a4b2e1c0253e06a9d800de637e34214edd873f6dc63f02c2175120

  • SHA512

    62c2fadf4351dfb5c6a69fd9c470caac02fe45f4c97a9a34cf9bfbb21c54eea84943cee111884324895638c57e4f3e5106785ca5511fcebf579d3777f67f11fc

  • SSDEEP

    12288:OfXZ/oTcaLmfOCeKbO9lRfwegvMAFqe+GTFbzMnnub5e:yg4ACNe2OiyOTaude

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7617051354:AAFrK85WiKexPD3DPywzlZaNaKqBnfNLHpg/sendMessage?chat_id=7000018009

Targets

    • Target

      TRANSMAN #5774 OUT 61930 DD. 18-3-25, USD 51.121,60.exe

    • Size

      549KB

    • MD5

      970cb878f60e0601a76aba3c7b1427f4

    • SHA1

      cab06293d813dd129a9a34bd1d6eaa3ca4b2c991

    • SHA256

      1728272602fae724ae826f2a53bcfdb2f82200d329771445cab7380d62a883d6

    • SHA512

      f76214bce967cbda4e42eaacd729ca0d3f1d832849575f72dce910cde404c9799aa7801f90224dc598be9ca76e8d54ecaf28f1fcf62257f1e751802048e24f83

    • SSDEEP

      12288:mqNPINJJL2glXVOhA4HGL0QI9fWmcIouyxQNJc95:LNPQx4W29cIo7x+Jc9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks