General
-
Target
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208.exe
-
Size
562KB
-
Sample
241115-twcgbaxdmg
-
MD5
a28d3f99e27d10c0b8bbafbd93424362
-
SHA1
d96b33c2062b095f450da5c6924b60c65b114081
-
SHA256
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208
-
SHA512
32659b6128b0db710b96ba75ac9d55d05ca2dda210f00096245f98654d3a346fdd51f8a3279dc2e5b17026cb1261bedb8e9bbdded99956a7931eab07c3ecafb6
-
SSDEEP
12288:VMyCwv2zJBCGt0Dv2xFdPZre4WY7YUSK9to3vDroOJ9TFZ3xuyLNQakJ:VMyzv2z+c0iFlkA/96nvjr0oNQx
Static task
static1
Behavioral task
behavioral1
Sample
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7902727677:AAGJNyNyNqvsIrmHZ46fa_-7pzxxlcwHHhM/sendMessage?chat_id=7582377093
Targets
-
-
Target
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208.exe
-
Size
562KB
-
MD5
a28d3f99e27d10c0b8bbafbd93424362
-
SHA1
d96b33c2062b095f450da5c6924b60c65b114081
-
SHA256
69bba73703ab073c2c161a4f93dbabc8dea73a6011d920d24537ae33a5dbc208
-
SHA512
32659b6128b0db710b96ba75ac9d55d05ca2dda210f00096245f98654d3a346fdd51f8a3279dc2e5b17026cb1261bedb8e9bbdded99956a7931eab07c3ecafb6
-
SSDEEP
12288:VMyCwv2zJBCGt0Dv2xFdPZre4WY7YUSK9to3vDroOJ9TFZ3xuyLNQakJ:VMyzv2z+c0iFlkA/96nvjr0oNQx
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2