General
-
Target
MB263350411AE.exe
-
Size
599KB
-
Sample
240508-jfxr7scb64
-
MD5
3163a6168fc16f3641c22d3a8e9d75bd
-
SHA1
b0c467c47e91d23cf21f400af048f91bc25aa9a8
-
SHA256
11dc8824044bb1848e5675025a503ac5f37a277883f4522d0e8a4f238d049345
-
SHA512
7eafd23dadab35d668f06ce27e221250f01fd559095ef328e89dade2a76de8a07406c92cfc544ea8e0ab153e9d84ac293b4c032ac79e3ba6ce7d4d17dcfb25d6
-
SSDEEP
12288:oJXiAEfDZqLo4Ms/5Waw8FqRxfmngADi69JGi+G5iphWbKhKMkKDO:ARE7ZYo4Mq5Wb8Fsx+ngIx3AVhWbKGKO
Static task
static1
Behavioral task
behavioral1
Sample
MB263350411AE.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
MB263350411AE.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.speedhouseoman.com - Port:
587 - Username:
[email protected] - Password:
SpH@0084
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.speedhouseoman.com - Port:
587 - Username:
[email protected] - Password:
SpH@0084
https://scratchdreams.tk
Targets
-
-
Target
MB263350411AE.exe
-
Size
599KB
-
MD5
3163a6168fc16f3641c22d3a8e9d75bd
-
SHA1
b0c467c47e91d23cf21f400af048f91bc25aa9a8
-
SHA256
11dc8824044bb1848e5675025a503ac5f37a277883f4522d0e8a4f238d049345
-
SHA512
7eafd23dadab35d668f06ce27e221250f01fd559095ef328e89dade2a76de8a07406c92cfc544ea8e0ab153e9d84ac293b4c032ac79e3ba6ce7d4d17dcfb25d6
-
SSDEEP
12288:oJXiAEfDZqLo4Ms/5Waw8FqRxfmngADi69JGi+G5iphWbKhKMkKDO:ARE7ZYo4Mq5Wb8Fsx+ngIx3AVhWbKGKO
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-