Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    938b1ab12f8ba4d200d7f40e5df4ecf60277ea011d10e4ad5c5dceb581fe35d1.zip

  • Size

    525KB

  • Sample

    250319-d6bd1avq14

  • MD5

    60bc56ac79953d7891335e6fae7af01c

  • SHA1

    4dc631cf706caad5c3ad89464d36b2417cc6e2cd

  • SHA256

    938b1ab12f8ba4d200d7f40e5df4ecf60277ea011d10e4ad5c5dceb581fe35d1

  • SHA512

    7e84160d5c94f7b76034de07216304a0ee1f5e2e5a8451af23a294ea0dd93472e8a7d98cbbb501b239ece0aef4daaed4771effd76ad9587909e6fb40961b43d0

  • SSDEEP

    12288:jJ6BFgfbhJwG6mE30fsi8aa+Oi0zrisyrRibj6VzRA:jSFibhJwYEwlqbkRtVz2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697

Targets

    • Target

      REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.exe

    • Size

      621KB

    • MD5

      38f235d25e264d4c15c7596bb02d74fb

    • SHA1

      1b61618f9b4a052f6141d001c121dab951400ccd

    • SHA256

      19298835e138f870193c12029158ec18ce6d1d4c5ec12372d533eaf855c0e7f0

    • SHA512

      6620e78413cc2e2447a08362969ceb7239306b373e45f5ffb84d1628e85f0ca72cfcadd374f26437c6a82fa1d19c6d2eea8fddf1f1ea6a64fe001fde857d46c4

    • SSDEEP

      12288:mQ07P9cnYUV833cfs0d4Rvo6ryCsyr0gM1cJP2:e7PWYUO349mRvTy7kJM1YP2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks