General
-
Target
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
-
Size
663KB
-
Sample
241115-sl4x5sweqk
-
MD5
2b3e92e864f53c18bb0eae31da025f10
-
SHA1
fdc8132052d658fe205dce9b67339b43a3f8b3c8
-
SHA256
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76
-
SHA512
78032027ce8a31eb529f636769ef38f565edb4b12d16f9c0a112af7d06352df1ee64acd3d9225d495df734309d04bf008d236812b68add96dc89381443f4b6bb
-
SSDEEP
12288:G0mnA1ztovdMjb6RIA7ENUGyOwFxDVin19zIor9t3DSDb4NJ:uA1ztovKQM6Gy5mnDz33ewf
Static task
static1
Behavioral task
behavioral1
Sample
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Evighedskalenders.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Evighedskalenders.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Trttes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Trttes.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7610532139:AAFiI3HHwFD6pWziyPu3lWJbRKPQtz0nD2c/sendMessage?chat_id=6680692809
Targets
-
-
Target
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76.exe
-
Size
663KB
-
MD5
2b3e92e864f53c18bb0eae31da025f10
-
SHA1
fdc8132052d658fe205dce9b67339b43a3f8b3c8
-
SHA256
02a274eea2ece1b7eebcc8f24892f1315675fb5d9b096cfb10dbb3215b902a76
-
SHA512
78032027ce8a31eb529f636769ef38f565edb4b12d16f9c0a112af7d06352df1ee64acd3d9225d495df734309d04bf008d236812b68add96dc89381443f4b6bb
-
SSDEEP
12288:G0mnA1ztovdMjb6RIA7ENUGyOwFxDVin19zIor9t3DSDb4NJ:uA1ztovKQM6Gy5mnDz33ewf
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Evighedskalenders.Url
-
Size
297KB
-
MD5
5486b2628ef878dcf6c0ff20fb44e1b2
-
SHA1
348bd502c7c5d043b96b56d12031422dabdbfc4c
-
SHA256
988aec254517a9ed62e9aee0ef9d5d3888600d915eea4e89ae803e298c6e3071
-
SHA512
bb450c02386e09fd27b7f91a8d72f387f05232819caf815caf433fb1efc5b2c6c5455ff6fe1e6e050aa14483cef5bcc9736a74bcdc13d43110a7131908a9b1f8
-
SSDEEP
6144:p9cW1YcfDZ3tMpgcrPoGoj2ovW4sEWBfUSmmXNOpedbuKGhwboUFddphW2ra3+:pfYcfDZ3tMpgcrPoGojJwEWlU1mdOpez
Score1/10 -
-
-
Target
Trttes.Lsg30
-
Size
49KB
-
MD5
7e324ee649b79b8d21cc35127546dc6f
-
SHA1
852fdc7255cff49666a79a8f1b196340679360bb
-
SHA256
ff5d64b1291d7f4d4f9274beb4a0f9bb49870cd80134a8b5392913154449b1fb
-
SHA512
df3d449df9c2e7a5258256ee5dfec849e3d5a4953674e203217e59fc2ad12fd2b44443031b1749f73e1d7051536e1db7a87bcc82a0c2cd151d17ce05422089f1
-
SSDEEP
768:llG7WqfCgl77rSbS6gD6cl9540oemcgtt0pyhFQzEaK1mHIZGX/SwjlZBqEH:LRqR77GzgD6M40oQgHHQzEx1mdX/SwV
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-