Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9.exe
-
Size
975KB
-
Sample
250327-thrdbawrs5
-
MD5
1d51a399962939a06396a4b4944eb33c
-
SHA1
c7f4dfb774d0998df523e4c799f32ea4560be3ea
-
SHA256
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9
-
SHA512
5a5ca673ade811e2ccaec97ed89d5cbb8b4ef361eef9de2aca3f7631ac197995d526fbff07a3e1466dc0c55e1e8db612cfbb8d78e7047f141cae376c27fb4cda
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FaUQGdLiPB8fWY:Xu0c++OCvkGs9FaUQbPBnY
Static task
static1
Behavioral task
behavioral1
Sample
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7725623378:AAFyPRXLgMaz6RepcrwiG-KkR7jNMc-SEgI/sendMessage?chat_id=5411784088
Targets
-
-
Target
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9.exe
-
Size
975KB
-
MD5
1d51a399962939a06396a4b4944eb33c
-
SHA1
c7f4dfb774d0998df523e4c799f32ea4560be3ea
-
SHA256
ec50af21b4179d62b3d9b417b5c1bedbd83ca369f3358e0ffe7073d3187bb8a9
-
SHA512
5a5ca673ade811e2ccaec97ed89d5cbb8b4ef361eef9de2aca3f7631ac197995d526fbff07a3e1466dc0c55e1e8db612cfbb8d78e7047f141cae376c27fb4cda
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FaUQGdLiPB8fWY:Xu0c++OCvkGs9FaUQbPBnY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-