General
-
Target
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398.exe
-
Size
1.1MB
-
Sample
221121-yalv3sea23
-
MD5
fd06aeefc7397dd23b37723a015bb4f7
-
SHA1
7ae26b0c428dc50fa802c16aeb555602b63b255b
-
SHA256
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398
-
SHA512
4cdf4c17c0a646e3586d88784aed09e0e31b2e55dd8c502012f5d7d2af7c20882114ae9b50771ce80e1fa8435414a7097d3c75959923ab4e30121650620afb45
-
SSDEEP
24576:wAOcZlYFHb9hHgV07huAPNnjLzCXPQ+T5beBP:uBHbfAV0lHCXY+TUBP
Static task
static1
Behavioral task
behavioral1
Sample
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398.exe
-
Size
1.1MB
-
MD5
fd06aeefc7397dd23b37723a015bb4f7
-
SHA1
7ae26b0c428dc50fa802c16aeb555602b63b255b
-
SHA256
1e9bbbeb040fa46c67bc853dcc4f0e7f10c9bb1f45b67b0060b2b5fe2c1ad398
-
SHA512
4cdf4c17c0a646e3586d88784aed09e0e31b2e55dd8c502012f5d7d2af7c20882114ae9b50771ce80e1fa8435414a7097d3c75959923ab4e30121650620afb45
-
SSDEEP
24576:wAOcZlYFHb9hHgV07huAPNnjLzCXPQ+T5beBP:uBHbfAV0lHCXY+TUBP
-
Snake Keylogger payload
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-