Overview
overview
10Static
static
3Snake-main.rar
windows7-x64
3Snake-main.rar
windows10-2004-x64
3Snake-Main...en.txt
windows7-x64
1Snake-Main...en.txt
windows10-2004-x64
1Snake-Main/Start.bat
windows7-x64
7Snake-Main/Start.bat
windows10-2004-x64
10Snake-Main...ts.txt
windows7-x64
1Snake-Main...ts.txt
windows10-2004-x64
1Snake-Main...ke.exe
windows7-x64
7Snake-Main...ke.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Snake-Main...ake.py
windows7-x64
3Snake-Main...ake.py
windows10-2004-x64
3General
-
Target
Snake-main.rar
-
Size
10.7MB
-
Sample
240709-razcvaxcpk
-
MD5
5df03c247e622bd42d86becfb3058419
-
SHA1
434dd72524d4d105eb6bc7301d18f690bff11792
-
SHA256
97ec311e0ffde2f3c26e4ff95ad37ad937db97fdf0a38e2c008d2f772a41e9f2
-
SHA512
21a91e253ddbf63fab1cb6df082a740736e871dfc0d34bcfd322b19f43ca978b32b7b9b3a3768b087ed8f7ba6827c06a4bcbbf0425c4d6a4308567f742d6f2f5
-
SSDEEP
196608:94ezdeVDnGAGTr4Z38xMpe88EuN3mFueeOuGc7Xio5XrCt34QFNZgN:9rzdGqJro38Ae8buJm61tSkWt34Qq
Behavioral task
behavioral1
Sample
Snake-main.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Snake-main.rar
Resource
win10v2004-20240708-en
Behavioral task
behavioral3
Sample
Snake-Main/Bot Token.txt
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Snake-Main/Bot Token.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Snake-Main/Start.bat
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Snake-Main/Start.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Snake-Main/requirements.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Snake-Main/requirements.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Snake-Main/vep-version/File/Stub/Snake/Snake.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Snake-Main/vep-version/File/Stub/Snake/Snake.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Stub.pyc
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Snake-Main/vep-version/File/Stub/other/coded/Snake.py
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Snake-Main/vep-version/File/Stub/other/coded/Snake.py
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
Snake-main.rar
-
Size
10.7MB
-
MD5
5df03c247e622bd42d86becfb3058419
-
SHA1
434dd72524d4d105eb6bc7301d18f690bff11792
-
SHA256
97ec311e0ffde2f3c26e4ff95ad37ad937db97fdf0a38e2c008d2f772a41e9f2
-
SHA512
21a91e253ddbf63fab1cb6df082a740736e871dfc0d34bcfd322b19f43ca978b32b7b9b3a3768b087ed8f7ba6827c06a4bcbbf0425c4d6a4308567f742d6f2f5
-
SSDEEP
196608:94ezdeVDnGAGTr4Z38xMpe88EuN3mFueeOuGc7Xio5XrCt34QFNZgN:9rzdGqJro38Ae8buJm61tSkWt34Qq
Score3/10 -
-
-
Target
Snake-Main/Bot Token.txt
-
Size
42B
-
MD5
3f349debeaf76810c360f057d5a72ac0
-
SHA1
a0193e0434fc3fc6ca127a7ae6653002fc430b2e
-
SHA256
2684ae07c0f5c230b37b749dd37abed350a98a93ace314be2200f4cb43b8c34d
-
SHA512
d73799479f63ad632ed1a15a38ea74834f18288aeb672b46d9249dfdc68adb9e429fcc6c8e4eb9d3856541a59a6819744fcc3e974dacd5c8bc8d304074ee1a20
Score1/10 -
-
-
Target
Snake-Main/Start.bat
-
Size
119B
-
MD5
7e66c1a0fd79f77535e29f61b336fb1c
-
SHA1
ef241e3e4133ac6d4874fb3200c6497a7f54cfa0
-
SHA256
a6d970a2792c4be79c1cf428540b6e845b04cf78fa3742d8c2f18b52b753ec8c
-
SHA512
f84c78589c8715127e1b50280a31efa9891a35cc26076e4037f3a30acfa3970005b224accc67182ff1ac4287463ea1b1738551b64c1d4037b1411075f7e6019b
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Snake-Main/requirements.txt
-
Size
75B
-
MD5
9919fded21c33c329b65ddf6583c808b
-
SHA1
4cca3f876ae342d57288d6e935b8fccd8dd4c28d
-
SHA256
4174d26338408461fae7af6a002ab36fbd4fb6c6ff5780cee048256ee843adae
-
SHA512
9de5eaf2ea33ea621cb89d8aee8be20fac87b3e9c38a2199d0cc1075d7737372033809ecd08e7d9a14adf7ef037f5b74a657fbeb17701d42fce8ff24b264127d
Score1/10 -
-
-
Target
Snake-Main/vep-version/File/Stub/Snake/Snake.exe
-
Size
23.9MB
-
MD5
106c5b57b34fbe26d889d1184261fc56
-
SHA1
f1474981d7a0cdc880d61cef99f54e4b8e73a0ac
-
SHA256
8818d41ba951ea693ad4a2d354e68da12995e7395e6056c3b8d620a2d311085a
-
SHA512
dc67faf1981711114b379f60e5e61497e834c5199557ea1fa5f84ca0a46cc02b8c14a0a84314aa789baa9e82f0718d148bc0f7de0324bf940c2ff3638b8e7d2f
-
SSDEEP
196608:yYKfhiPA4mtSHeNvX+wfm/pf+xfdkRDZWKsnarIWOzW0Daq1H:7GvvtSUvX+9/pWFGRlBsnarIWeRa4H
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
875KB
-
MD5
d398a61be5accd43bdda880519488d56
-
SHA1
c558a8af011a80357e2724c3ebc3a8a5382955b9
-
SHA256
23a73e43ee16fb52536b62eb77d461f513fd9f8b7c78b60da85e81ecad2fd9d3
-
SHA512
5985f2c499429d13a96fea5da8fcbd1b82dd838e997d674fa75d5b9f0f611155082c51885053367a7ce4f40ce34256e2860c8b4976bd1a03bb8fe92fb1ad5a06
-
SSDEEP
24576:5XbayuT+bmwMM4o2r/GetZ2s8A5pEsIDMy9cOk3Xa:Puqbm3l4AgRYa
Score3/10 -
-
-
Target
Snake-Main/vep-version/File/Stub/other/coded/Snake.py.py
-
Size
7KB
-
MD5
77b6e524a8e2f139689e3cc0560ee1c2
-
SHA1
bc1034f88e9452e202fa02719d540f6592840049
-
SHA256
0a7a0e525fec16389e94f8e70e3c07b3a0e7628e6e2928112e255c203e0d15ee
-
SHA512
9901543520638d3afb6b20d1a8f5a19dddba8b2b59916d29420189a37baa30e65eaa973b383669447487cd6d0f5882c7fc217359a5b00db260e9381c48bd8163
-
SSDEEP
24:I777777777777777777xM777777777777777777xM777777777777xM77777777h:H
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1