General
-
Target
BELL210 AND ALLOUETTE III.js
-
Size
8.8MB
-
Sample
230210-l8jgdshg4v
-
MD5
dfb37335684d81ea565f5281c9a799e4
-
SHA1
ba58fc83b2a10b111c6db6ae31ee03cfd201b8fc
-
SHA256
e5a333dae12ac8664bcc0bd12b991ec8095256e4aaf15f6afeb5b014e70146ed
-
SHA512
e055886a61b86402a3ed136fa33bda70106b6904e4c2b4a6b1f685923c281f2f1a66ee1dea0f589f7b0de52498d40b56825a892c09effbbabd527bd72825433b
-
SSDEEP
3072:AiePnmJZBc9hVWQlxlclBwd0PGGGUSJREQX4ULG9LbuewHVP3eJuR0RfuzkQYhsY:V
Static task
static1
Behavioral task
behavioral1
Sample
BELL210 AND ALLOUETTE III.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
BELL210 AND ALLOUETTE III.js
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5958393772:AAGyX-afxRqNUOVdPT528XtfkgekWKm1kNE/sendMessage?chat_id=1407227065
Targets
-
-
Target
BELL210 AND ALLOUETTE III.js
-
Size
8.8MB
-
MD5
dfb37335684d81ea565f5281c9a799e4
-
SHA1
ba58fc83b2a10b111c6db6ae31ee03cfd201b8fc
-
SHA256
e5a333dae12ac8664bcc0bd12b991ec8095256e4aaf15f6afeb5b014e70146ed
-
SHA512
e055886a61b86402a3ed136fa33bda70106b6904e4c2b4a6b1f685923c281f2f1a66ee1dea0f589f7b0de52498d40b56825a892c09effbbabd527bd72825433b
-
SSDEEP
3072:AiePnmJZBc9hVWQlxlclBwd0PGGGUSJREQX4ULG9LbuewHVP3eJuR0RfuzkQYhsY:V
-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-