Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    27032025_0118_25032025_NewOrderDetails001.zip

  • Size

    585KB

  • Sample

    250327-bwhdfsxqw4

  • MD5

    25efa00eab46dda638f72307c17306f1

  • SHA1

    3c624373923dabd9fc903e6646730aebfcc437d7

  • SHA256

    17b9af8229e658c65137789ad07b3f1164ba2bc62dcd78307fc72308e078408b

  • SHA512

    55c66043c36acce5831f89cc60df3a41d54ecd0a29e6d82f2ff43e346d2251b297aad16313b8fa17e369b3759fab696cd6ddd4e7826c031eee78e6da53313509

  • SSDEEP

    12288:Rs+IaE7t5GjHg9uPrCsAlzmlYcbSFdlYiq1oIsFDuZD:RsoEGjA0TCsAtjQSF3Y0I6DKD

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      New Order Details001.exe

    • Size

      674KB

    • MD5

      58c6327c00cdd8af95c8e6fcd1570391

    • SHA1

      c4af72cd2f67424b54614c0985ebf57f79e388a6

    • SHA256

      1295ff5f148dcda8475e87b2070c2f0f09e78e70072fac1eb9ca71e4c76b9c24

    • SHA512

      9d843aaac71b904eb332ef52a5d1043435d2e28c8583ebae79ec1b8c16a365488df83b87dc50808eb655293394ed5cfd3d150b27965c0aff3a539f19d501ead6

    • SSDEEP

      12288:SAZMg2XYlgXBaoLvtG7Hgd+PDCoeZz6licNSFh/wsq1oIIRMMrnIz3:vp2Ioo7AA7Coe1VWSFpwiIgZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks