General
-
Target
f04d67cb7677014fce76d3eb4eb14513f06e968241cb9e02378cd64ddca96c3d.rar
-
Size
506KB
-
Sample
240908-rcz26azdpq
-
MD5
d7be5bbdd4b360ac514c0a7e24af2865
-
SHA1
46fadd8b5d9248f28b0f01c8c4ae5da7fe56303d
-
SHA256
f04d67cb7677014fce76d3eb4eb14513f06e968241cb9e02378cd64ddca96c3d
-
SHA512
7cfb6853e5cf1c52def44224a1a5e241f94b8f0f629c9b0d44663a9e69fbba59a8937de2c93f8945531b5f8b59f7f55e35500234e3c0fce21b71e0247f356dd4
-
SSDEEP
12288:mP4y8vTx8WcERmw/wObKF2B81/ZqVUUY63i+QBKoC9oAk+9xY6Vf:mP4y8rx+E/82B3UL6pQBKF9oiTVf
Static task
static1
Behavioral task
behavioral1
Sample
DOC030222-03022022133454.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOC030222-03022022133454.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
dot1n2002.servwingu.mx - Port:
587 - Username:
[email protected] - Password:
34(fgj5n]hjE - Email To:
[email protected]
Targets
-
-
Target
DOC030222-03022022133454.exe
-
Size
70.0MB
-
MD5
bd57b0a1274b9f3b72e3e6dc16987f78
-
SHA1
9909c6463eec32f6a0b57d86a89c8746c1c0e431
-
SHA256
544bcd37f2451628755df5917671493844a63efbc5056dac8ebf84f25f788288
-
SHA512
da2eb06866b494e3ef106a03593610e8bc4bec7702c24640c5d82d9a2235eea84f39aa7efc67eadff6908c897e922921f32da8588ddea734a9defc8630ddf80c
-
SSDEEP
12288:gb28w2UdchuF+PzldKSL7V9J7Q/2Hj98r6FN+60:J8lCMuF5U9VQ/2HjsY+6
Score10/10-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-