General
-
Target
tax-invoice-0711.zip
-
Size
515KB
-
Sample
241008-pvnezaxfkl
-
MD5
ae57b32dc1506af53e8afd3c3342d904
-
SHA1
b20058ba2b0ba35e1d77ecab4b75affe6f0914ce
-
SHA256
d275df9764628c52330d1cfcfe1e3c3eba4b29d536c825515128be883158c653
-
SHA512
ae124c9b22227d064cdf2772f49069eaaff496875909d7a1e6b679caf169a67531a943d6494dcdd178bc996b56abc566e1bbbb77c82887cebfbb55b6c3e51afb
-
SSDEEP
12288:Ty//fZq2N4BMeTSoUzs/mWQtdeaz/6HmrW1RmVlI5:Ty//TYMEShzoyreajQ0I5
Static task
static1
Behavioral task
behavioral1
Sample
tax-invoice-0711.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tax-invoice-0711.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6515689087:AAEnerpIS1xuf83Wz7mf2-PPkvlmor9Mt7U/sendMessage?chat_id=1015404316
Targets
-
-
Target
tax-invoice-0711.exe
-
Size
526KB
-
MD5
d25d303ca9ec88e005cbab9f35d4d210
-
SHA1
3c037df248b5b25e139cc7fc6142e6cd371446a3
-
SHA256
dcf3ebaa281f05217097685b485ab9b56711ed87679cf755ee82ebfa4479c01e
-
SHA512
fe416e58f5f32c7807bba84bd3c33376130a841e89afc7b4c3fd10d38c779d1fb1636a4f85501d69e99e8b9aca06ec65538667daa64ccdb259522e584feb00c1
-
SSDEEP
12288:xf0D4BQWzdAUxsfSWSLne4ZdzkpnRmkYwhX83X4Nu1jW:xhQQZxmoze47KRmkYwxmXk6S
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-