General
-
Target
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f.exe
-
Size
528KB
-
Sample
241119-gl43cs1hrm
-
MD5
b763612a26d5020ee8f91abb78517dcf
-
SHA1
24a91ef3cb3fd9eab1f35ac117cd48b4045fce56
-
SHA256
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f
-
SHA512
fbc4915e004dabfb93a1c2de17287d442597aac881c0c45fe03b397a7986eaa37e6c4072299021dcb14162f5ff350bf72127bd8db7112d73b5a392ce98b3a992
-
SSDEEP
12288:Nn0nsDtXORI+det48HAh/+qiwxo62nSvQ/f2Zq:N0nOXUI+dE4gAh/+qnp2eQWZ
Static task
static1
Behavioral task
behavioral1
Sample
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7720120586:AAEL1VybRIeGFqc29yI4D0-l0jQ_HF7ry5s/sendMessage?chat_id=6419839739
Targets
-
-
Target
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f.exe
-
Size
528KB
-
MD5
b763612a26d5020ee8f91abb78517dcf
-
SHA1
24a91ef3cb3fd9eab1f35ac117cd48b4045fce56
-
SHA256
c087790833ae259686895407c9f60de7ef7614956fae617761998a4a5467f60f
-
SHA512
fbc4915e004dabfb93a1c2de17287d442597aac881c0c45fe03b397a7986eaa37e6c4072299021dcb14162f5ff350bf72127bd8db7112d73b5a392ce98b3a992
-
SSDEEP
12288:Nn0nsDtXORI+det48HAh/+qiwxo62nSvQ/f2Zq:N0nOXUI+dE4gAh/+qnp2eQWZ
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-