General
-
Target
greatthingswithgreatideasgivenmerestthignstgood.hta
-
Size
130KB
-
Sample
241023-gtq6gawfrp
-
MD5
b507badbce69dc67d803b7f3b1385036
-
SHA1
b15c7634732a783b64414505ac4a5c095405f886
-
SHA256
80b9bfa671f8626c76da94f0f39a03987278bd32e40851068a399bc69a4e05ca
-
SHA512
a844a487906193c9265b67d7f3b1b617de3f227c205e043a1238cca7dbb9c1782480b001bd68de97cc86597e13205466bd433771b681d9b64bb4404f67f1abd3
-
SSDEEP
96:Eam7xBVS9Mrv6VS9qrvpDCFl/Aoy58VS9sVS9QSrvdVS967T:Ea2xBQ9Gv6Q9wvaoiQ9sQ9QIvdQ9QT
Static task
static1
Behavioral task
behavioral1
Sample
greatthingswithgreatideasgivenmerestthignstgood.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
greatthingswithgreatideasgivenmerestthignstgood.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8129252196:AAFb_vUYwennKVolbwpXf3vnDfT_yhozHns/sendMessage?chat_id=7004340450
Targets
-
-
Target
greatthingswithgreatideasgivenmerestthignstgood.hta
-
Size
130KB
-
MD5
b507badbce69dc67d803b7f3b1385036
-
SHA1
b15c7634732a783b64414505ac4a5c095405f886
-
SHA256
80b9bfa671f8626c76da94f0f39a03987278bd32e40851068a399bc69a4e05ca
-
SHA512
a844a487906193c9265b67d7f3b1b617de3f227c205e043a1238cca7dbb9c1782480b001bd68de97cc86597e13205466bd433771b681d9b64bb4404f67f1abd3
-
SSDEEP
96:Eam7xBVS9Mrv6VS9qrvpDCFl/Aoy58VS9sVS9QSrvdVS967T:Ea2xBQ9Gv6Q9wvaoiQ9sQ9QIvdQ9QT
-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-