General
-
Target
Business_License_and_order_confirmation.zip
-
Size
506KB
-
Sample
241003-szj5wswdmg
-
MD5
65507e7009e8894d5ab6cf4a612da5c4
-
SHA1
d3ad1357b314de44a22f62004e1d55da94fd5b15
-
SHA256
75f46aca8782194fef67c5df2632a76736674afa4b5791d44ca3d30e039754bc
-
SHA512
26cfb0367ffad8f9bed5486b244bf8add1bbbf74fcc0bc6b9bd69f8db058551fdf4982e201cbf166f8c33736e3097b317de6a52800ed6b65417c6ee2594c2179
-
SSDEEP
6144:5cf/hZqSw98xAVoqagYAydOKRVAX88EbtVknTS1UcLAWqSL8AXl4mWDq7c4MS3c+:5cXhNBmwZSTyUcmq8AXiukg
Static task
static1
Behavioral task
behavioral1
Sample
Business_License_and_order_confirmation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Business_License_and_order_confirmation.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6515689087:AAEnerpIS1xuf83Wz7mf2-PPkvlmor9Mt7U/sendMessage?chat_id=1015404316
Targets
-
-
Target
Business_License_and_order_confirmation.exe
-
Size
674KB
-
MD5
9df7034c98b3290a35186546ca8c0028
-
SHA1
8439a19f41bc2327615bc4bfe941d35fd7fc5fe7
-
SHA256
fc2bdbad12bfe9fc0121328bab79347f90e2b45454f87fb8814162ab81040200
-
SHA512
c43c042de886e5669661c505b85a7fa06f29d2551962f131627a4a727d952b0bcb0d66667b62d27e51263e2fb8dbc7facf968eef373d536b7015b6dc458f6e39
-
SSDEEP
12288:MSBhH7RDsH9lRhr4LEATyUkYq8AP/ABsV7N5:/v76UjTy189s7N
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-