General
-
Target
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4.vbe
-
Size
12KB
-
Sample
240905-cc7pnssbrg
-
MD5
329e1af755bf0dbe171429dd561c1608
-
SHA1
3a0eea78171cecc5940bf2b110c1c9f8da8c8885
-
SHA256
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4
-
SHA512
096b4e5a00333174b0f054736bd11977a85255fc5f1f2d9964f31f132842a8144dffb667af74a5dd575f587287212509037aae6cf74d5973b3e3ea432240a622
-
SSDEEP
384:tTlEogaI4dPJuUMkRZOeXLe7t1LkHNplbZ7CA:ZqjWJUkGey7t1AHpbZt
Static task
static1
Behavioral task
behavioral1
Sample
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4.vbe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4.vbe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bisttro.shop - Port:
587 - Username:
[email protected] - Password:
W79cDo2h05Iv - Email To:
[email protected]
Targets
-
-
Target
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4.vbe
-
Size
12KB
-
MD5
329e1af755bf0dbe171429dd561c1608
-
SHA1
3a0eea78171cecc5940bf2b110c1c9f8da8c8885
-
SHA256
f52532696b6e7074ae190045efca78d973c8b72d6fd8852c61ccba50e0dea1f4
-
SHA512
096b4e5a00333174b0f054736bd11977a85255fc5f1f2d9964f31f132842a8144dffb667af74a5dd575f587287212509037aae6cf74d5973b3e3ea432240a622
-
SSDEEP
384:tTlEogaI4dPJuUMkRZOeXLe7t1LkHNplbZ7CA:ZqjWJUkGey7t1AHpbZt
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-