Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    malware9.exe

  • Size

    563KB

  • Sample

    250327-p3llcassdy

  • MD5

    ed0d4ea7186b6197ef04a2d7e6b4f01d

  • SHA1

    21a428d9299528a69e9e1b56cebfd57686417270

  • SHA256

    185f2a5bba8a703412e82d5fd9e5864291a6317c63c6ab4fd65dd62f5afe453f

  • SHA512

    8f2eb48525b75efca6ec4a80fbf10e46fcd9e82a2c598093b9af8edd3b43e3e86b884bdd1d18f84b47fa33f3e496815a56c7bef13c0acea5fb52260f2e55be61

  • SSDEEP

    12288:Kw2ak9Yvhq9nyubO7Sfl1P3xU69EfKUaOKyOtZK4g4d4goEzv6dN:lJk9YvMnyuC7El1P3fmfqOdOyZ4d1oe

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7614991532:AAE3scDxiAdb7-yM-r88zZdxgW12A9tLuoY/sendMessage?chat_id=7207594974

Targets

    • Target

      malware9.exe

    • Size

      563KB

    • MD5

      ed0d4ea7186b6197ef04a2d7e6b4f01d

    • SHA1

      21a428d9299528a69e9e1b56cebfd57686417270

    • SHA256

      185f2a5bba8a703412e82d5fd9e5864291a6317c63c6ab4fd65dd62f5afe453f

    • SHA512

      8f2eb48525b75efca6ec4a80fbf10e46fcd9e82a2c598093b9af8edd3b43e3e86b884bdd1d18f84b47fa33f3e496815a56c7bef13c0acea5fb52260f2e55be61

    • SSDEEP

      12288:Kw2ak9Yvhq9nyubO7Sfl1P3xU69EfKUaOKyOtZK4g4d4goEzv6dN:lJk9YvMnyuC7El1P3fmfqOdOyZ4d1oe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks