General
-
Target
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe
-
Size
513KB
-
Sample
241205-tj3sqsxqdm
-
MD5
f747bd84ca6e30d0f6c82363613df40b
-
SHA1
c50a288da4d21ee75622bd30fc3a2fa69a488e8c
-
SHA256
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7
-
SHA512
d33b0b4c46cf265584104876607a59374eab4e38e82b213a1852e47c22fc25ef378d57d933586eb0f8bbd3fcdb4e26e2d8c0d89beb696f16f49256675dcdb872
-
SSDEEP
6144:8eEKVOJIA7ezJbjWSECMLYmPxjzkoz9btOvDeF/4erMBx6taEga4X2q/uXR8Yx5j:bUSFbjp4zxoferaKih4RzycBIyp
Static task
static1
Behavioral task
behavioral1
Sample
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.murchisonspice.co.za - Port:
587 - Username:
[email protected] - Password:
orders786q#
Targets
-
-
Target
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe
-
Size
513KB
-
MD5
f747bd84ca6e30d0f6c82363613df40b
-
SHA1
c50a288da4d21ee75622bd30fc3a2fa69a488e8c
-
SHA256
de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7
-
SHA512
d33b0b4c46cf265584104876607a59374eab4e38e82b213a1852e47c22fc25ef378d57d933586eb0f8bbd3fcdb4e26e2d8c0d89beb696f16f49256675dcdb872
-
SSDEEP
6144:8eEKVOJIA7ezJbjWSECMLYmPxjzkoz9btOvDeF/4erMBx6taEga4X2q/uXR8Yx5j:bUSFbjp4zxoferaKih4RzycBIyp
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-