General
-
Target
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c.exe
-
Size
549KB
-
Sample
240925-bth7zazbnh
-
MD5
888781b003dd274110af195bb86b2266
-
SHA1
1377619c9b0e405d3752f3bd28575351ba9c3c40
-
SHA256
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c
-
SHA512
d0209be51fc0d734cd31592cc866aa86c3e3505be649de125a75c4b5083a52f19edb49672466203508ba02573c091740778c66568db1d958ea6e2da81dd62f1a
-
SSDEEP
12288:5OY8bQb2Nh3oVaC19X24xBXEKbX28bs/hCfCGQVOK:5CI2N+VJDcK7bs/YfjQVO
Static task
static1
Behavioral task
behavioral1
Sample
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c.exe
-
Size
549KB
-
MD5
888781b003dd274110af195bb86b2266
-
SHA1
1377619c9b0e405d3752f3bd28575351ba9c3c40
-
SHA256
29c28a9ef59434bd31cef1a6c94303d5f97af0d434a032ced63c278eb84d546c
-
SHA512
d0209be51fc0d734cd31592cc866aa86c3e3505be649de125a75c4b5083a52f19edb49672466203508ba02573c091740778c66568db1d958ea6e2da81dd62f1a
-
SSDEEP
12288:5OY8bQb2Nh3oVaC19X24xBXEKbX28bs/hCfCGQVOK:5CI2N+VJDcK7bs/YfjQVO
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-