General
-
Target
8f6d690e119684b1629d41f97b83fb23.bin
-
Size
554KB
-
Sample
241120-bval8axhnp
-
MD5
bb7697b76d5da4a8aa1b9719ff4f9c84
-
SHA1
b7d655ce4708aa53f781f0efc9c8ceef0c24aeb8
-
SHA256
4e65a7e9e8c4466251e4ecf61e0758691bfd41bd141e4dedde3b78aad380b531
-
SHA512
746d0ce4b2be701c795b61e32d9ced953b9c097ca3a37d1f4c48fa2372db78f9afe4ab9ddac61863828ac3f62392dd8f75f3865b11c0c3194feb69d0fbc3e8bc
-
SSDEEP
12288:bz1Dm8uKgfFLwx15kJMVnAX06C8hppPTmePfwbR:tzuKk6GBXD1pP7Pfw1
Static task
static1
Behavioral task
behavioral1
Sample
c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29.exe
-
Size
620KB
-
MD5
8f6d690e119684b1629d41f97b83fb23
-
SHA1
46efdb7ae7079a781723d75e390431aa4c6080e5
-
SHA256
c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29
-
SHA512
aa25c86da804170e08f3e4d5d64d7d07007bee539b26b27bc39476de4f99fca8fc0d7eaa3854556d004217982ab36c83f8f15bb21cbf1ffcc382edd911631d9c
-
SSDEEP
12288:bMVmiWX9OeYHC89ljwRbfWwtODSyaAXd1mA1Ak6OsgSb4VqU+H4o5zBFtyakR:gTONYHFvjwRzCxXd1mvOsH6eYoLy5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-