General
-
Target
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4.exe
-
Size
537KB
-
Sample
240925-bk9csswcnj
-
MD5
930955d0b312fc683f0481fe7e1ea2f3
-
SHA1
f45109d7a4d6efec3ca0d7f446475e1e9f1798e6
-
SHA256
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4
-
SHA512
2166e575e9869e257b6894299ef5241b779f348a887e056fc1c2c9ffbe80757a0a0b0be5eb9b135ddad3ea556bcdd106ec8eae2f223cae540206459333add4fd
-
SSDEEP
12288:4S8bQbddyK0Bopoa89nadgPlW1sDlZnLlpO0PHlS:4hIzyKIK0adgr5ZppO0I
Static task
static1
Behavioral task
behavioral1
Sample
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4.exe
-
Size
537KB
-
MD5
930955d0b312fc683f0481fe7e1ea2f3
-
SHA1
f45109d7a4d6efec3ca0d7f446475e1e9f1798e6
-
SHA256
136351dfc04d6749ec6922958903035b80e7bfcb2eee7527e9fdf72bcd8561e4
-
SHA512
2166e575e9869e257b6894299ef5241b779f348a887e056fc1c2c9ffbe80757a0a0b0be5eb9b135ddad3ea556bcdd106ec8eae2f223cae540206459333add4fd
-
SSDEEP
12288:4S8bQbddyK0Bopoa89nadgPlW1sDlZnLlpO0PHlS:4hIzyKIK0adgr5ZppO0I
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-