Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    f5c545c35d36074f461f765f34ba274dae1e12eabd4c050f68641fe3944ba7fe.rar

  • Size

    522KB

  • Sample

    250319-e8ygzswmt5

  • MD5

    a1ca14f7de4f8f40186f3a75e6494937

  • SHA1

    2d5ae4659702824896c243a69fb9dd7b8c6710ca

  • SHA256

    f5c545c35d36074f461f765f34ba274dae1e12eabd4c050f68641fe3944ba7fe

  • SHA512

    6df4fccb4e396e489bc264cd4a7cb0da5f6404554ae8339e029d77c8d5a8818e9b0051cb8a018d9cdb5d829d67b42029c9c48defa1a76375992e05867290755a

  • SSDEEP

    12288:IasIgpJ4cc6oPr9M8KEkjg/djL//nWW9+PzpJPYDkABn8t:VuL7K68nB2xvP

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697

Targets

    • Target

      PURCHASE ORDER.exe

    • Size

      621KB

    • MD5

      38f235d25e264d4c15c7596bb02d74fb

    • SHA1

      1b61618f9b4a052f6141d001c121dab951400ccd

    • SHA256

      19298835e138f870193c12029158ec18ce6d1d4c5ec12372d533eaf855c0e7f0

    • SHA512

      6620e78413cc2e2447a08362969ceb7239306b373e45f5ffb84d1628e85f0ca72cfcadd374f26437c6a82fa1d19c6d2eea8fddf1f1ea6a64fe001fde857d46c4

    • SSDEEP

      12288:mQ07P9cnYUV833cfs0d4Rvo6ryCsyr0gM1cJP2:e7PWYUO349mRvTy7kJM1YP2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks