General
-
Target
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3N
-
Size
667KB
-
Sample
241006-czmysazfpk
-
MD5
050e6b2d0613fae1b6d8df6e75fcea50
-
SHA1
0b22613068fd49e91e2bc7506421032f02d43ff6
-
SHA256
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3
-
SHA512
e08c4dddb59b64be79fdc3a5fdd99b15cacbfce3a0a7ce6746d02cec6b5d7de5d8e6072d3e900a9a97a27698761b6f0589ecc11d21659f67aa8c0af7f62fa1fa
-
SSDEEP
12288:r1ZF8KWULcTsua8wH1rOUbbNRma9060onGs3LBmFXh3TxkR:ryfULGs1dbn9VnGGLBmhG
Static task
static1
Behavioral task
behavioral1
Sample
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6515689087:AAEnerpIS1xuf83Wz7mf2-PPkvlmor9Mt7U/sendMessage?chat_id=1015404316
Targets
-
-
Target
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3N
-
Size
667KB
-
MD5
050e6b2d0613fae1b6d8df6e75fcea50
-
SHA1
0b22613068fd49e91e2bc7506421032f02d43ff6
-
SHA256
3ef3d036ce3461514a05633df722905d738b93311b67ed3ed7b7707e654e7af3
-
SHA512
e08c4dddb59b64be79fdc3a5fdd99b15cacbfce3a0a7ce6746d02cec6b5d7de5d8e6072d3e900a9a97a27698761b6f0589ecc11d21659f67aa8c0af7f62fa1fa
-
SSDEEP
12288:r1ZF8KWULcTsua8wH1rOUbbNRma9060onGs3LBmFXh3TxkR:ryfULGs1dbn9VnGGLBmhG
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2