Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    707add74e2e080ebea3b2e64c7a17fb360f81b99a339f6c05334fc4822a2fbcc.rar

  • Size

    522KB

  • Sample

    250319-dq8pka1xfv

  • MD5

    d9e38cb2ed18e1531e824f2f6a338921

  • SHA1

    0b07cea85e3abdea289dca6c5733c85e39865464

  • SHA256

    707add74e2e080ebea3b2e64c7a17fb360f81b99a339f6c05334fc4822a2fbcc

  • SHA512

    b53ebd4f2e31bce3fc860e52263961405ae95f0744b8f851d6bb71b33872d77e17b339c5c8b31d36332a4c83c471af43bdbc35723c5fd247eab5f1a731338d99

  • SSDEEP

    12288:masIgpJ4cc6oPr9M8KEkjg/djL//nWW9+PzpJPYDkABn8W:HuL7K68nB2xvw

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697

Targets

    • Target

      TOP20250252.exe

    • Size

      621KB

    • MD5

      38f235d25e264d4c15c7596bb02d74fb

    • SHA1

      1b61618f9b4a052f6141d001c121dab951400ccd

    • SHA256

      19298835e138f870193c12029158ec18ce6d1d4c5ec12372d533eaf855c0e7f0

    • SHA512

      6620e78413cc2e2447a08362969ceb7239306b373e45f5ffb84d1628e85f0ca72cfcadd374f26437c6a82fa1d19c6d2eea8fddf1f1ea6a64fe001fde857d46c4

    • SSDEEP

      12288:mQ07P9cnYUV833cfs0d4Rvo6ryCsyr0gM1cJP2:e7PWYUO349mRvTy7kJM1YP2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks