General
-
Target
2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader
-
Size
8.6MB
-
Sample
241002-xlsbkaveqd
-
MD5
45beee362263f775f572b18a4aeec0de
-
SHA1
fd32e703b282412371d06e800f35a4446482654d
-
SHA256
410025278f63c2177d732ae410a4713a84d59167f3e92b48d779d071773e0ac9
-
SHA512
f1d660cbf50cda72a377eb72e6347d4a47efd9c3c6a3552d855e808ecfe861e22f8c6e92f33c1504842d51335ab5aadff6d869e3555bfa202fb9c3983030114b
-
SSDEEP
196608:sTB9dOqQTB9dOqoTB9dOq7TB9dOqXTB9dOq3FIF0wu:szdOqQzdOqozdOq7zdOqXzdOqv
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6839394068:AAEgmde6OU-W-eNGJXPHD9JvEnnTtqhauBg/sendMessage?chat_id=6475103768
Targets
-
-
Target
2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader
-
Size
8.6MB
-
MD5
45beee362263f775f572b18a4aeec0de
-
SHA1
fd32e703b282412371d06e800f35a4446482654d
-
SHA256
410025278f63c2177d732ae410a4713a84d59167f3e92b48d779d071773e0ac9
-
SHA512
f1d660cbf50cda72a377eb72e6347d4a47efd9c3c6a3552d855e808ecfe861e22f8c6e92f33c1504842d51335ab5aadff6d869e3555bfa202fb9c3983030114b
-
SSDEEP
196608:sTB9dOqQTB9dOqoTB9dOq7TB9dOqXTB9dOq3FIF0wu:szdOqQzdOqozdOq7zdOqXzdOqv
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1