General
-
Target
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N
-
Size
527KB
-
Sample
241009-3yg91s1gmb
-
MD5
0766745a1e47110b99674de3b2a8bb00
-
SHA1
fcbe357415a4505ad02c92bfe4e28cc2372d9bea
-
SHA256
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055
-
SHA512
4a3bf06cc1169cc41b474763cd2fcfa4ac2b7f044ceb0b05982501b492570652efa07e98339f8ea8e26717306d04b3dcabca360968e3a1190c5501388a2d933d
-
SSDEEP
12288:1f09ZppPNIuu5wU/bK9sRarTjl0fCOQmlKdXeWlv9u3EN:1SpVT87aD+fCOQmlH
Static task
static1
Behavioral task
behavioral1
Sample
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7013350856:AAEMW-L9OH6xJPBSHadxtnabC3gFbH_e250/sendMessage?chat_id=7239159003
Targets
-
-
Target
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N
-
Size
527KB
-
MD5
0766745a1e47110b99674de3b2a8bb00
-
SHA1
fcbe357415a4505ad02c92bfe4e28cc2372d9bea
-
SHA256
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055
-
SHA512
4a3bf06cc1169cc41b474763cd2fcfa4ac2b7f044ceb0b05982501b492570652efa07e98339f8ea8e26717306d04b3dcabca360968e3a1190c5501388a2d933d
-
SSDEEP
12288:1f09ZppPNIuu5wU/bK9sRarTjl0fCOQmlKdXeWlv9u3EN:1SpVT87aD+fCOQmlH
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-