Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    64b1530391cbadbcbd78d8a1f96b68e19a176d2c82261edbb567c57bbbf2da72.zip

  • Size

    501KB

  • Sample

    250319-dj6avs1xbt

  • MD5

    cc939895a5e247608d2d8323ca2897ba

  • SHA1

    a6639c5234cf51c5a5051e299684382c667bf57b

  • SHA256

    64b1530391cbadbcbd78d8a1f96b68e19a176d2c82261edbb567c57bbbf2da72

  • SHA512

    829648fc1660c16a6b59e3011d04b840b4531ef71b647717413841419818260b4b82da8daf9e947e9b5dde348a0276a1ffc990bfc59a25013ecbc1114826a920

  • SSDEEP

    12288:9fXZ/oTcaLmfOCeKbO9lRfwegvMAFqe+GTFbzMnnub5B:Dg4ACNe2OiyOTaudB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7617051354:AAFrK85WiKexPD3DPywzlZaNaKqBnfNLHpg/sendMessage?chat_id=7000018009

Targets

    • Target

      Swift copy.exe

    • Size

      549KB

    • MD5

      970cb878f60e0601a76aba3c7b1427f4

    • SHA1

      cab06293d813dd129a9a34bd1d6eaa3ca4b2c991

    • SHA256

      1728272602fae724ae826f2a53bcfdb2f82200d329771445cab7380d62a883d6

    • SHA512

      f76214bce967cbda4e42eaacd729ca0d3f1d832849575f72dce910cde404c9799aa7801f90224dc598be9ca76e8d54ecaf28f1fcf62257f1e751802048e24f83

    • SSDEEP

      12288:mqNPINJJL2glXVOhA4HGL0QI9fWmcIouyxQNJc95:LNPQx4W29cIo7x+Jc9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks