General
-
Target
70aaa3cfe01401db8f01fdf377138094.bin
-
Size
528KB
-
Sample
240904-jge9jsxgnd
-
MD5
8b1ba1dc783a6d04196d0418bd96c974
-
SHA1
44faff698c93b69ce0eea90a60e1db7c01e45684
-
SHA256
026a9146b7249b04d1d1045ac03fac50b8adbc46bed20ff6f81e83e0408c63cc
-
SHA512
6060804f4cc292d1974d24a36f88177c81e52829748fab31eb74740df3099faa4ccbf65c4c292781098f1d17a750275d5017963766a25613d0cc968f46f6b5b5
-
SSDEEP
12288:6+tGMQRSXgohCaouHDUDS0ZwRmqJB1co5C4Je:1gDgXgohVouHQDS0ZEd1c8lk
Static task
static1
Behavioral task
behavioral1
Sample
d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.speedhouseoman.com - Port:
587 - Username:
[email protected] - Password:
SpH@0084
Targets
-
-
Target
d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe
-
Size
552KB
-
MD5
70aaa3cfe01401db8f01fdf377138094
-
SHA1
7523fe037a1be040dc180e86ef1395e893e1d87c
-
SHA256
d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd
-
SHA512
fbf2ee8a9a4e449a7cd7d59ddfda3feb34acee4ad98e405ddca679281ec60d6ecfb03457c8412721893856304e86c64f56c498b63c0c29be901809c2e48813d3
-
SSDEEP
12288:w8QdRlF6YLqGfrds/2s0yADkpixHp+V2pX+9EmgiW:ORv6/Gfr82s0yixHkV24Sm4
Score10/10-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-