General
-
Target
PO_20248099-1 12,300PCS.exe
-
Size
523KB
-
Sample
240910-w7htkszcjg
-
MD5
5db9f3f1609f4cd4df6f627977d09fd7
-
SHA1
90bf0d85af20f8b712ea7e1fd9724e1ecb16589b
-
SHA256
ea08961190b8399e21cfb503fcbb3caee0a5ab92294311bda03b7e511ece876b
-
SHA512
03d708bf0d82863b667a3f91e284262ba58286580ad7214e0ec1008aba1760b21f3f518ffc7dc049887b2d099ecc0e92fc4a639f8811317fc535eae4c43659ef
-
SSDEEP
12288:FlEEFet43oFyro4IZ/kHT7R6GJ9i/LH+F+KawP:Fnot43oFyoJZ/kHT7R6gz+Ka
Static task
static1
Behavioral task
behavioral1
Sample
PO_20248099-1 12,300PCS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO_20248099-1 12,300PCS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7196633070:AAEaQuZOF5M-L_385uI9rwN0ik3yySrTapE/sendMessage?chat_id=1343335992
Targets
-
-
Target
PO_20248099-1 12,300PCS.exe
-
Size
523KB
-
MD5
5db9f3f1609f4cd4df6f627977d09fd7
-
SHA1
90bf0d85af20f8b712ea7e1fd9724e1ecb16589b
-
SHA256
ea08961190b8399e21cfb503fcbb3caee0a5ab92294311bda03b7e511ece876b
-
SHA512
03d708bf0d82863b667a3f91e284262ba58286580ad7214e0ec1008aba1760b21f3f518ffc7dc049887b2d099ecc0e92fc4a639f8811317fc535eae4c43659ef
-
SSDEEP
12288:FlEEFet43oFyro4IZ/kHT7R6GJ9i/LH+F+KawP:Fnot43oFyoJZ/kHT7R6gz+Ka
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2