General
-
Target
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74.exe
-
Size
521KB
-
Sample
240926-c6zk6ashjn
-
MD5
d5a6193b01c8b4f4a1d70de986f2581a
-
SHA1
83146988eefd85c295e43336021a82bdae3e03fc
-
SHA256
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74
-
SHA512
12b11063db76a6319a74b0f3debab63d051b48c85ca1a3b27bc8c8a34c8091960341fbf40d6f3db1bdc6cead878bda0123bd3d40ef164b6ad5a5c70704f78872
-
SSDEEP
12288:p/CqjqYBxuBdwmEZ9ictORFP+yfpDHI3Rtj6IFKap5AW:p6pUxuB2mE7irPhBs3jrNTB
Static task
static1
Behavioral task
behavioral1
Sample
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7205528810:AAHpQmp8pXDD3HdZBbwmUH_nIHswhyx25IQ/sendMessage?chat_id=5483672364
Targets
-
-
Target
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74.exe
-
Size
521KB
-
MD5
d5a6193b01c8b4f4a1d70de986f2581a
-
SHA1
83146988eefd85c295e43336021a82bdae3e03fc
-
SHA256
fb32ee963d4a3a9ee628b7953fd14fb98fe1257946ce05c6e922005d05cdac74
-
SHA512
12b11063db76a6319a74b0f3debab63d051b48c85ca1a3b27bc8c8a34c8091960341fbf40d6f3db1bdc6cead878bda0123bd3d40ef164b6ad5a5c70704f78872
-
SSDEEP
12288:p/CqjqYBxuBdwmEZ9ictORFP+yfpDHI3Rtj6IFKap5AW:p6pUxuB2mE7irPhBs3jrNTB
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2