General
-
Target
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3.exe
-
Size
553KB
-
Sample
240906-b5jymsyhrr
-
MD5
4b6a4185deab6ab773c385544348ad2d
-
SHA1
063ce8ac9989d729ee476f05dc4b4ca0e4683d36
-
SHA256
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3
-
SHA512
0a79a552bebef3006492e3501458222d099c5968599e819827dce321872da2cce1a1fcaf7d603c96083c9214671f35dac6fcd63a98871f74ce61bab8b9cdf6ea
-
SSDEEP
12288:T6Z6wR7njY2nH1TjZhqxXo7qyzTwHHyxeB7nk80OS:mZ6wNjLHBj7qxXoGQwHHrBTF
Static task
static1
Behavioral task
behavioral1
Sample
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
dot1n2002.servwingu.mx - Port:
587 - Username:
[email protected] - Password:
34(fgj5n]hjE - Email To:
[email protected]
Targets
-
-
Target
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3.exe
-
Size
553KB
-
MD5
4b6a4185deab6ab773c385544348ad2d
-
SHA1
063ce8ac9989d729ee476f05dc4b4ca0e4683d36
-
SHA256
c7a131685f4235140da8b3310a3d1816527268ba1cd788b24e5011b572eaf9a3
-
SHA512
0a79a552bebef3006492e3501458222d099c5968599e819827dce321872da2cce1a1fcaf7d603c96083c9214671f35dac6fcd63a98871f74ce61bab8b9cdf6ea
-
SSDEEP
12288:T6Z6wR7njY2nH1TjZhqxXo7qyzTwHHyxeB7nk80OS:mZ6wNjLHBj7qxXoGQwHHrBTF
Score10/10-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-