Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd.exe
-
Size
987KB
-
Sample
250327-rx15ystsgx
-
MD5
58fd54106157d2c514d61a77d34df89b
-
SHA1
b94c0be6a242ea5808bce1396d3e4bbedbc3a620
-
SHA256
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd
-
SHA512
b2afdec29ad746295a91d9bfcf2f5def55926e52e212cc8e09862e6c664213ce2b4c03a85b17fb71a4015e59ff6a8065386031b1d505d508abc0914b5285fb87
-
SSDEEP
24576:pu6J33O0c+JY5UZ+XC0kGso6FajEJjuZ2QMWY:Lu0c++OCvkGs9FajEJKZtY
Static task
static1
Behavioral task
behavioral1
Sample
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7720966822:AAEDKrUlx5r9gfLmPGYoRjaYs8t6cOW3Mi0/sendMessage?chat_id=1166322455
Targets
-
-
Target
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd.exe
-
Size
987KB
-
MD5
58fd54106157d2c514d61a77d34df89b
-
SHA1
b94c0be6a242ea5808bce1396d3e4bbedbc3a620
-
SHA256
e4dc621e2aef5e6f4d3b3087572efb9816ce555894a039002fa5cebf053df8cd
-
SHA512
b2afdec29ad746295a91d9bfcf2f5def55926e52e212cc8e09862e6c664213ce2b4c03a85b17fb71a4015e59ff6a8065386031b1d505d508abc0914b5285fb87
-
SSDEEP
24576:pu6J33O0c+JY5UZ+XC0kGso6FajEJjuZ2QMWY:Lu0c++OCvkGs9FajEJKZtY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-