General
-
Target
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe
-
Size
531KB
-
Sample
241119-fxy5tawkbm
-
MD5
07ee6bc3f0ca6f6a5b7d0b9824a79cbf
-
SHA1
3701b4dc923b624576038d327753580f768cfae0
-
SHA256
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2
-
SHA512
5b90d27ca78c37aa7fd11ef225bf51a49be067c3d1c54b849b43d6f7d4902419cd769f6a42ea7166cab9624ec8ec6c9a90e24a763a866c4adb1ff7b1d8833428
-
SSDEEP
12288:GAj/s0yek+BBlUVh+Z0D8MWoftBOMTCD8ztwerE6H1nN:5a07UtYAFJe9qZ
Static task
static1
Behavioral task
behavioral1
Sample
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7854764352:AAGsvrx8n7ByYi4c9ksbK9NcQWi81dzmeE8/sendMessage?chat_id=7894030394
Targets
-
-
Target
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe
-
Size
531KB
-
MD5
07ee6bc3f0ca6f6a5b7d0b9824a79cbf
-
SHA1
3701b4dc923b624576038d327753580f768cfae0
-
SHA256
acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2
-
SHA512
5b90d27ca78c37aa7fd11ef225bf51a49be067c3d1c54b849b43d6f7d4902419cd769f6a42ea7166cab9624ec8ec6c9a90e24a763a866c4adb1ff7b1d8833428
-
SSDEEP
12288:GAj/s0yek+BBlUVh+Z0D8MWoftBOMTCD8ztwerE6H1nN:5a07UtYAFJe9qZ
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-