Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    15e3969b02f27f51c3cd4d7dc82a0bae316486c051dfc131b61107755c762410

  • Size

    492KB

  • Sample

    250320-mqcfssz1fs

  • MD5

    0675e1857410c6674b5a42cc06ca1a7c

  • SHA1

    8e50ca7ee68565cdcd55f68688e43956f284fe76

  • SHA256

    15e3969b02f27f51c3cd4d7dc82a0bae316486c051dfc131b61107755c762410

  • SHA512

    e416e223a7de59c962af3f9e337574d5090804d2da9fdae45c6604027efc91a4e392d3ea1613b7fd4971c412d376e4b00f03e14242d23fce7ada8faaa79dc87c

  • SSDEEP

    12288:wz/CFV9gphyqY/uEwMBh8XEAzmGCOjkK7iwUgMcpeKSo2:C/A9gpAJDB2XEJGCOrUgMKot

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7841206174:AAFIFQ-X89iFs47BPCa2qxGTb4X0TxBAjuk/sendMessage?chat_id=5521168189

Targets

    • Target

      New order.exe

    • Size

      543KB

    • MD5

      2d3010dd8f268b4945777debe66d1adb

    • SHA1

      e13995eb2b8137768980eddb4b329c2059a9ee3e

    • SHA256

      8a54d3c9af3aa73ee06abc101d4c1791adbefdd205a1d576cfcfab423d441c87

    • SHA512

      fd28e6122eed4cd849f6fd8d4830b6d1b98e8ca0cd6e2cb21fd7ffb51435d00fbb0d4bfa882998f022ff898344b366470fa9f1f4a4d232402bfeb0964348f5ad

    • SSDEEP

      12288:Ii66T19VqAJRJSpod7we/MEwMZXzk8XEAzmGiOjKK7iwUUWJcUJr8Mw:IxOlkyfTDZXzLXEJGiOFUUJU98

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks