General
-
Target
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461.exe
-
Size
807KB
-
Sample
241107-dq66qstkcz
-
MD5
0419b4d9f3a81ee1e4c22d989903edd4
-
SHA1
19315399d70f593d8c456758f59e278006bf85a7
-
SHA256
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461
-
SHA512
5455b2af1c09b47a83dcdfbfea4c6c8f1cf17dbdd161679f63836d7a0c39497a60f09e80fc911b7908260a2804e28914acda71012193f35d180c6078b9d78629
-
SSDEEP
12288:GTfvtpmBKE2Db57IHDwm9tYsFINny0n6v3HoBpm5BH2xSLkUPcC/bykR:GTe2n5sHDnvYAs03IBpqQ2kUPFzB
Static task
static1
Behavioral task
behavioral1
Sample
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461.exe
-
Size
807KB
-
MD5
0419b4d9f3a81ee1e4c22d989903edd4
-
SHA1
19315399d70f593d8c456758f59e278006bf85a7
-
SHA256
c80986ae29269ced5ae5d3c62833734693c71efbc0dc760aa4ae807f76ef7461
-
SHA512
5455b2af1c09b47a83dcdfbfea4c6c8f1cf17dbdd161679f63836d7a0c39497a60f09e80fc911b7908260a2804e28914acda71012193f35d180c6078b9d78629
-
SSDEEP
12288:GTfvtpmBKE2Db57IHDwm9tYsFINny0n6v3HoBpm5BH2xSLkUPcC/bykR:GTe2n5sHDnvYAs03IBpqQ2kUPFzB
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-