General
-
Target
malw.exe
-
Size
724KB
-
Sample
241011-jd1fbaxerm
-
MD5
208a7cf0646365f76dd6e381e96cf6f3
-
SHA1
21d89072373999a525a29882802eb639c6850c03
-
SHA256
8a33c8b3367ce89f7b0a54accfb415c98f1c6ebadf1fb72d150c575fa85b7b5d
-
SHA512
05b980d8c72289a5d3e8d4134a9b285c82dea833c5f3016ea627649bfea5def48ddb136e3909b77b37a8b2d017965ac123a023e5439cd1319cda339f94d6a681
-
SSDEEP
12288:MjqZqdLyerVbCx3YNo18QAulSOfiH93n5N2Ia5oMsn3+wQBBQA6AfwBhptfO5ItE:+qZq5rVbCx3YNdQ1xw5cIhKlBH6EwDzC
Static task
static1
Behavioral task
behavioral1
Sample
malw.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
malw.exe
-
Size
724KB
-
MD5
208a7cf0646365f76dd6e381e96cf6f3
-
SHA1
21d89072373999a525a29882802eb639c6850c03
-
SHA256
8a33c8b3367ce89f7b0a54accfb415c98f1c6ebadf1fb72d150c575fa85b7b5d
-
SHA512
05b980d8c72289a5d3e8d4134a9b285c82dea833c5f3016ea627649bfea5def48ddb136e3909b77b37a8b2d017965ac123a023e5439cd1319cda339f94d6a681
-
SSDEEP
12288:MjqZqdLyerVbCx3YNo18QAulSOfiH93n5N2Ia5oMsn3+wQBBQA6AfwBhptfO5ItE:+qZq5rVbCx3YNdQ1xw5cIhKlBH6EwDzC
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-