General
-
Target
79861c58558e7cd10c66a41edda287077ce8ee7516060066a21f254a85aef72e
-
Size
540KB
-
Sample
241106-m92j2azbpr
-
MD5
af270d746eefa5e32cfad0ef3a77fe27
-
SHA1
3af69a53603fde1ed3e8bf29dde183c2502fe8d1
-
SHA256
79861c58558e7cd10c66a41edda287077ce8ee7516060066a21f254a85aef72e
-
SHA512
d51dac8b00fb414c0b1e0421fb17edc4f2dc93b0876024d7738ebf8b46e65d72c0d98cd5545981c5a18882468313d240ad879492616becc343eeca7130a7b079
-
SSDEEP
12288:puXITue0qDCtCMYfEJqigPVorNLlQeOeGXV6ZA7ujEl:UpvYfqqigPVorPXTfEl
Static task
static1
Behavioral task
behavioral1
Sample
Contract.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Contract.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.murchisonspice.co.za - Port:
587 - Username:
[email protected] - Password:
orders786q#
Targets
-
-
Target
Contract.exe
-
Size
571KB
-
MD5
1bc8a8efa890196a91f54124e2b4b30f
-
SHA1
3436f66f6af1fc6698e5ef631386465da692ee33
-
SHA256
1bed29c0a6409a825cc6c5d3cfe488a5524432c0ccb2e896a44c7bc87d252f22
-
SHA512
e5bf2b6110b31f0760f2fceb7372df2f146f8e79612468c556439834c0e344d7fada1e07d7739009fff15c50e39bf668246b8a6b37259876c343d446c85e3e62
-
SSDEEP
12288:uUPZbEeX/C9M5YrN17Iq+PoQeSeAXVf4Y1BRMQ0b2r8lM4:uUPh//C9M5Yx1T+oXHubRI1lM4
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2