General
-
Target
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe.exe
-
Size
789KB
-
Sample
241107-cqaxvstbmf
-
MD5
05e37e00aeb345d46e0d6d227788d0e7
-
SHA1
a0074e96d230f0a0bf8231a7abf6bc7cb628ed48
-
SHA256
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe
-
SHA512
2832448ce5601476d84c4a7a0cd405faaaf7cdf928892cd341e0f1f7850382f879b9d9fe4cc61131f3292f05cedfdc73cc4fdbe2ec54d4c108e429b181da3d63
-
SSDEEP
24576:IMwhYyOsQzjhJj1kc3qZx0PARxFWfcFqal/F4X5ZiNI:IMwh9OR9JRvaZq+WfQiX56I
Static task
static1
Behavioral task
behavioral1
Sample
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Biggings148/Soranere.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Biggings148/Soranere.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8040460346:AAFN58T9Y0-aqdzScEiebBO06S141L8RsSA/sendMessage?chat_id=6680692809
Targets
-
-
Target
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe.exe
-
Size
789KB
-
MD5
05e37e00aeb345d46e0d6d227788d0e7
-
SHA1
a0074e96d230f0a0bf8231a7abf6bc7cb628ed48
-
SHA256
2e39f29b755fc805008c9e6f1176886fa8a95f24b747c7b89111a2760df010fe
-
SHA512
2832448ce5601476d84c4a7a0cd405faaaf7cdf928892cd341e0f1f7850382f879b9d9fe4cc61131f3292f05cedfdc73cc4fdbe2ec54d4c108e429b181da3d63
-
SSDEEP
24576:IMwhYyOsQzjhJj1kc3qZx0PARxFWfcFqal/F4X5ZiNI:IMwh9OR9JRvaZq+WfQiX56I
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Biggings148/Soranere.Red198
-
Size
54KB
-
MD5
45a45d4ca67207bba6b7c59f4516279d
-
SHA1
3b366b1fb6a9e042c37162c8173f51a6b3690650
-
SHA256
76a1abb4c1bea47aeda60dffe2c54b786dd79574a04f2267fa771ceb968d1cb5
-
SHA512
ac0fc5884b44b0e0257545b36410e31de3542374872780b831cb0440cdab8759e7c40ba67ec542978a32aecd372ea72766b1e1ace321a4e9793757e862cd8076
-
SSDEEP
1536:jE21LD6iMX98cWySJec5W2Q7oKzOraaeSo0:Y8eik1oec5a0sOrNeSo0
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-