Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    27032025_1542_27032025_order452000739355.zip

  • Size

    528KB

  • Sample

    250327-s5vtkstzgz

  • MD5

    8e78bb60b94d34f964081dfd781c85d4

  • SHA1

    952d964f5cc3505f10462598775568a8e75ab3b4

  • SHA256

    e1d702b919e66b8ed54a4f95e085e8f08ec1fc931b742d8037c085282afb94ff

  • SHA512

    83361633863097acae65b2d8f891c0fe690b1fae435f5ca507885dadb77149319db6f3abb0a116b6bd337c95eac671df623fc523310c6368c0335b154376b468

  • SSDEEP

    12288:9Qcz+apFS/J5UJXs88Xg8TQ/lt/knGWQpn/fWgQ9sqIxoMJxqMU+7:9Qcrp2J5actXgR/lKFQpX9Q9OxNWMU+7

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      order452000739355.exe

    • Size

      640KB

    • MD5

      2ef5e80bf4e6f0d3029f1bba361420f7

    • SHA1

      42f1c5473f6f40ec13bdc2cc4c390c3915942a67

    • SHA256

      2fb7505c8296c864ebf2e99348f4465997be63da7f99867170772a7aeea7d35f

    • SHA512

      476ca7a6c0a19be26a33c68ef762bb4e1ba199de55e3807c7787611482923942b85b3ecb0fe4c559bb79d46b3a6f9f442d064e7ece7642c32b9e66f09a3fc983

    • SSDEEP

      12288:VRco9fTeXwDxs86uRA0MKQ/lTdkLGQaoiAU/f+UQhs5aR8VI/B:Lco9fKwDy30M3/lGtaoVEvQh1R8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks