Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8eae39e54a2e968f3758e1b24128b62d85322fe0398bcfbe5132f224dcbfe6b4.r02

  • Size

    496KB

  • Sample

    250319-d4zc2svqy9

  • MD5

    4ac0ec219bbfc3d6637249327db5bd42

  • SHA1

    a1612fbdda37e61673636050380d228cef5a92a5

  • SHA256

    8eae39e54a2e968f3758e1b24128b62d85322fe0398bcfbe5132f224dcbfe6b4

  • SHA512

    36937872aa6a4db25baf1c6e999bcdeec997207cdb5ef1ebbd6d6ab5b785e90b7bee75febb27a638c31e71ceca566bbd6ff7da5c492f2f49e03e7e072181c32c

  • SSDEEP

    12288:K0gh8xNVQMVRA7X+QAVqOnTaRrNAmo/YEBXUCm20i+5sa:I8LA6Qs0rNANDGk0i+5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7341566981:AAH_QhKPgpHvD4E-8Yu-Ykq_swRA6fRW7TE/sendMessage?chat_id=7564846096

Targets

    • Target

      PO NO. 4000196529.exe

    • Size

      546KB

    • MD5

      c4c6ae08650f793270c084646903f70b

    • SHA1

      70620b3f3924bcd2a52c2199a4d10ba0f3b807a2

    • SHA256

      595e9098c3748bee87937fb4d8fd6620891926c9e9077299687428d4f48140f9

    • SHA512

      058f651fb927f6e15be04f0b611f36ee5e46f1e5e7b9009d6ba62ac69e6ef1bfad91e17177dbf7f78cfeca6e325450c8af6a6a2f351c56d93c182614ad4a23cd

    • SSDEEP

      12288:uLNPINJyW5MweK/z18I5OI++4GLQeCJktveWEdvFQd8+:KNPrW7Jh8I5PmGxWWaFQd8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks