Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
28032025_0118_27032025_mv anna schulte vessels details.zip
-
Size
529KB
-
Sample
250328-bpflaasns2
-
MD5
5e25d29818f83e794453a147f3090134
-
SHA1
ecd1b5690411b4a1ee075f71e6d3cddbaabb0624
-
SHA256
393621cf5ce27e5974e23a5de057075f19287d1980f4c990be7110bd54c6a3a1
-
SHA512
bf5a655037530be6baf6417774f9e890ac978c9953d8f53b9d1eca19bb5b7d1836837ed704561a7cb1d5097e3621f3dca1ff69e85f14267dc7571deeb37c38a2
-
SSDEEP
12288:1nIZS/SX9mQTNrlLObP5feSnslMnbqPRT+MW93cHoUxF:lStrprROVfeSbUNwcIoF
Static task
static1
Behavioral task
behavioral1
Sample
mv anna schulte vessels details.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mv anna schulte vessels details.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.holpak.pk - Port:
26 - Username:
[email protected] - Password:
Balansholland@8617 - Email To:
[email protected]
Targets
-
-
Target
mv anna schulte vessels details.exe
-
Size
641KB
-
MD5
a396d84cf0c4d102d78851459a0e471a
-
SHA1
dc4e21fa02de3253b6eed68cbc76b57d9bb78e34
-
SHA256
853b49c1e4fc2c040164ce927b7eb619feef66bb61d16b223ec352673a336e12
-
SHA512
69eb8ff09c8fd3124418ae0383182e181fce8931452cf891a348014b09d43d965323d0bcc81b0b661500a426c4094a717bda758f38213f7ed7d3c2e4920c2e1d
-
SSDEEP
12288:twe9fTeu/mQYLNSrNxOxh9fem5slMvZ0PHb+MWV3c3eVS5gqPd:me9fNrWYrPONfemzYNKc3emd
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-