Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
27032025_1542_27032025_order452000739355.zip
-
Size
528KB
-
Sample
250327-tm4t7swrx7
-
MD5
8e78bb60b94d34f964081dfd781c85d4
-
SHA1
952d964f5cc3505f10462598775568a8e75ab3b4
-
SHA256
e1d702b919e66b8ed54a4f95e085e8f08ec1fc931b742d8037c085282afb94ff
-
SHA512
83361633863097acae65b2d8f891c0fe690b1fae435f5ca507885dadb77149319db6f3abb0a116b6bd337c95eac671df623fc523310c6368c0335b154376b468
-
SSDEEP
12288:9Qcz+apFS/J5UJXs88Xg8TQ/lt/knGWQpn/fWgQ9sqIxoMJxqMU+7:9Qcrp2J5actXgR/lKFQpX9Q9OxNWMU+7
Static task
static1
Behavioral task
behavioral1
Sample
order452000739355.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
order452000739355.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.holpak.pk - Port:
26 - Username:
[email protected] - Password:
Balansholland@8617 - Email To:
[email protected]
Targets
-
-
Target
order452000739355.exe
-
Size
640KB
-
MD5
2ef5e80bf4e6f0d3029f1bba361420f7
-
SHA1
42f1c5473f6f40ec13bdc2cc4c390c3915942a67
-
SHA256
2fb7505c8296c864ebf2e99348f4465997be63da7f99867170772a7aeea7d35f
-
SHA512
476ca7a6c0a19be26a33c68ef762bb4e1ba199de55e3807c7787611482923942b85b3ecb0fe4c559bb79d46b3a6f9f442d064e7ece7642c32b9e66f09a3fc983
-
SSDEEP
12288:VRco9fTeXwDxs86uRA0MKQ/lTdkLGQaoiAU/f+UQhs5aR8VI/B:Lco9fKwDy30M3/lGtaoVEvQh1R8
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-