General
-
Target
1ad767f865f642736b9ce33bdb40e4d58e6d2bb6b10cfa12ca71ac291f889e74.zip
-
Size
534KB
-
Sample
240524-bfacxafe8t
-
MD5
c97030ee895a1e872e97f9698ddcb03f
-
SHA1
77e4290b828effc7253d3cde449ad6ca32118b8f
-
SHA256
1ad767f865f642736b9ce33bdb40e4d58e6d2bb6b10cfa12ca71ac291f889e74
-
SHA512
9dd5f3894033fe52e02dcc1e5dc248ce70ddd38cad0b4b9be71f9fefe49845fa80590c226b879f0b2cdac43c9b6a28b55f8e33f15f2f21254a55bc45823895f6
-
SSDEEP
12288:EzKb3tPsN5sJfVtHDZxgACBUFjKxAss9zJDsNK4KJdg6g41:Hb++JdBDvgAC6BiBsroYdd+41
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Invoice.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.speedhouseoman.com - Port:
587 - Username:
[email protected] - Password:
SpH@0084
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.speedhouseoman.com - Port:
587 - Username:
[email protected] - Password:
SpH@0084
https://scratchdreams.tk
Targets
-
-
Target
Invoice.exe
-
Size
557KB
-
MD5
7ccea594742ef8616d4329ae4b13d65f
-
SHA1
2cc66eb1781ca1389e5b961f6904ba819770cf62
-
SHA256
3235c0cc1e4c983e8e11ad3f9fe6af66cf5cda2d4f4730f84cd290d877136b6c
-
SHA512
59eef8e1cbedf34393b262f3d84e61a67e552db3ce8d95c492d5559449694d2d6324882c84b844d496b2ae9a7a81dd42df81b6a0a4ff74a8c02e964a680d4a3d
-
SSDEEP
12288:dVTlZnKl3tPs75yJfVtHNrx8ACBUtjKxisU9zJDs1K4YJHg6gi/:nZZKlCYJdBN98AC65izUrow9H+i
-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-