General
-
Target
53a0d54afb4eb2bd9165a13af16f64a17ae394e840ed94e274a94f3c4c686024.zip
-
Size
527KB
-
Sample
240724-b6d4sathmd
-
MD5
69f8c5387e9a357c29a1b47bc72765d9
-
SHA1
b28368414c9b4a44807ccdb2c99f2999a533c52d
-
SHA256
53a0d54afb4eb2bd9165a13af16f64a17ae394e840ed94e274a94f3c4c686024
-
SHA512
11e4d393094e554174b59227d3e4b1b42eb04f225c423fb84ee39eca74e188f9d77010e580029c5d174ddfaff6260302390dc58472f1c7faf14d7ca642a787da
-
SSDEEP
12288:VXFTMH6obATUrXLjKUPqoWhbLYSlYqNk09MchYZKwqdO/St7021DWU:VVTM54cP58lgWh8KLWi702lWU
Static task
static1
Behavioral task
behavioral1
Sample
Solar Solve Ltd Works Quote 16378.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Solar Solve Ltd Works Quote 16378.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.remfryson.com - Port:
587 - Username:
[email protected] - Password:
CnG_23*NMA
Targets
-
-
Target
Solar Solve Ltd Works Quote 16378.exe
-
Size
552KB
-
MD5
fdbffab12910e6d406fb7ee60afaf6ed
-
SHA1
4d9ef1a9e7a99e2bc6da280b14705d0660cd27ac
-
SHA256
bed59c144540d5cd1662becc04e1d7cb2c974023ae5cc1689d6070961561d8b1
-
SHA512
b5fc68b675829b9c9ece4b782ba115da7e91b3c4d618de5e5b816a157e132da2b7bd48f068b212dfb3fa6f69ca67a81c996d23e291fd7505190bbcceafdbbf18
-
SSDEEP
12288:NQdRlF6Xg81mRMTuQMcpYZKwq8sxGg5dc169iH2:yRv6Xt1mRMTuIp8KL8sv5dcIl
Score10/10-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-