Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    af85b3dd1220a06d400a1790531468769fa3bbe1b45ff71eafa6afecbf4a8381

  • Size

    492KB

  • Sample

    250320-kqm67aywas

  • MD5

    62969aee5bac8c02ef3895abbf353e64

  • SHA1

    3b057bb09a0ad2a769971d5bfc66c42dcae5972c

  • SHA256

    af85b3dd1220a06d400a1790531468769fa3bbe1b45ff71eafa6afecbf4a8381

  • SHA512

    86fe851429fc721258411628cc8557296809e24f71c6b4ced6f89021330cc35cc3b431b0426e60d2157ca6890453bde37c34b5d6109d98d48ef359fffbb16612

  • SSDEEP

    12288:3z/CFV9gphyqY/uEwMBh8XEAzmGCOjkK7iwUgMcpeKSoo:j/A9gpAJDB2XEJGCOrUgMKox

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7841206174:AAFIFQ-X89iFs47BPCa2qxGTb4X0TxBAjuk/sendMessage?chat_id=5521168189

Targets

    • Target

      Payment advice.exe

    • Size

      543KB

    • MD5

      2d3010dd8f268b4945777debe66d1adb

    • SHA1

      e13995eb2b8137768980eddb4b329c2059a9ee3e

    • SHA256

      8a54d3c9af3aa73ee06abc101d4c1791adbefdd205a1d576cfcfab423d441c87

    • SHA512

      fd28e6122eed4cd849f6fd8d4830b6d1b98e8ca0cd6e2cb21fd7ffb51435d00fbb0d4bfa882998f022ff898344b366470fa9f1f4a4d232402bfeb0964348f5ad

    • SSDEEP

      12288:Ii66T19VqAJRJSpod7we/MEwMZXzk8XEAzmGiOjKK7iwUUWJcUJr8Mw:IxOlkyfTDZXzLXEJGiOFUUJU98

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks