General
-
Target
d7be5bbdd4b360ac514c0a7e24af2865.bin
-
Size
502KB
-
Sample
240909-b3hykayarh
-
MD5
4f747bc3a874bb199252abbb1fc5cb9e
-
SHA1
5b84bfd1d456111b6091d89f6e3abba9b17c297d
-
SHA256
84e981533ba050914811f5018ad09a233283645117940a9c7d509085d7c13f71
-
SHA512
29be3ecb430ad13c352b19ab5842e3836f43600c64138e38323d4e8eb0469fc3c1f80716dba16cd55d0edcd12de714f6d17f3d8d078c6e7fee593fc64e2d29b3
-
SSDEEP
12288:Dj520SK1fFFC4rq66QokLfYxE5hxC8K2dvn2g0DwNfHV:vfFFC4m9kP3K8Tl
Static task
static1
Behavioral task
behavioral1
Sample
DOC030222-03022022133454.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DOC030222-03022022133454.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
dot1n2002.servwingu.mx - Port:
587 - Username:
[email protected] - Password:
34(fgj5n]hjE - Email To:
[email protected]
Targets
-
-
Target
DOC030222-03022022133454.exe
-
Size
70.0MB
-
MD5
bd57b0a1274b9f3b72e3e6dc16987f78
-
SHA1
9909c6463eec32f6a0b57d86a89c8746c1c0e431
-
SHA256
544bcd37f2451628755df5917671493844a63efbc5056dac8ebf84f25f788288
-
SHA512
da2eb06866b494e3ef106a03593610e8bc4bec7702c24640c5d82d9a2235eea84f39aa7efc67eadff6908c897e922921f32da8588ddea734a9defc8630ddf80c
-
SSDEEP
12288:gb28w2UdchuF+PzldKSL7V9J7Q/2Hj98r6FN+60:J8lCMuF5U9VQ/2HjsY+6
Score10/10-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-