General
-
Target
04052024_0046_02052024_ORDEN DE COMPRA URGENTE.zip
-
Size
499KB
-
Sample
240504-a43tpahb7w
-
MD5
a8e9c9cbd229df2c91e51bd7aa7a4e04
-
SHA1
524d170ede0eabcbe52393334dfe619a63240033
-
SHA256
7a56691185c2b5d61fe9f750dbfb5cdb4c4e3cb0c1867a7ee63afdc202472a93
-
SHA512
4bd9692ecd8ae730c2873ea719888a7e941343542d1356c94988dd7ac78364b303c087b122ac7447a325ef7106a148d2a10997466a0a2bdbcdbe47ffaca26326
-
SSDEEP
6144:AI48WQp+VPHQfoQpBsVIJmmLpQ4jBC6NsHucaGhVLEzIIHze7yoT0hRTm0GfZEAq:AI47BHQAbY2gbvQsIIHvoTcTCmAq
Static task
static1
Behavioral task
behavioral1
Sample
ORDEN DE COMPRA URGENTE.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ORDEN DE COMPRA URGENTE.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.gbogboro.com - Port:
587 - Username:
[email protected] - Password:
Lovelove@123
https://scratchdreams.tk
Targets
-
-
Target
ORDEN DE COMPRA URGENTE.exe
-
Size
511KB
-
MD5
8463433369d127bc0d6fd650771c0421
-
SHA1
25d94b622456b5fefab687d83481d61148563137
-
SHA256
95e987cd2cc805c4d478b31ab1387f5aaa19f9b2ef08f045255554c0031235f5
-
SHA512
4af7d35d6f3c71138176b2ae58624dfe43caae9bc214d49191d6c9ec6a88f3a2c60a5daea485f7d91282917627d3009cb2125bfbe543507ba04e2a163053ca9b
-
SSDEEP
6144:IZe/Wqp+HPH+foUpBs7svmcLnQ4pBu6Ni1ic2GV7LELIkHzwbyaP4hTBmO4fCEAR:IU2vH+ABYEUH72wIkHZaPqBMnAR
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-