General
-
Target
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945.exe
-
Size
604KB
-
Sample
241205-var6bayrbn
-
MD5
1b2c5925f817391f987f9c7d599f331d
-
SHA1
b2ee3433a4fa2a4b65c41f9ed7d245b12e36ad1a
-
SHA256
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945
-
SHA512
28fb585e4c97718557aee2e12b6175e45552a0ef5e5ac58303e41622bf440d2240cadea753b308c0f1b1606b8a73d5cbc8da336f94b0f2430e34a00d0f645ea3
-
SSDEEP
12288:ibeXOhIcac6YGxHF4hXeP81fsA0e8qzYdv1CW9lQB:keX6acZe6f9NJz9KlQB
Static task
static1
Behavioral task
behavioral1
Sample
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://cpanel2-nl.thcservers.com/ - Port:
21 - Username:
[email protected] - Password:
Uvob2G1Tc73ZCus02X
Targets
-
-
Target
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945.exe
-
Size
604KB
-
MD5
1b2c5925f817391f987f9c7d599f331d
-
SHA1
b2ee3433a4fa2a4b65c41f9ed7d245b12e36ad1a
-
SHA256
d89d3fdca5f381807589342c4fd6bc6f46c06f9ab0fce6e147241cc7e04db945
-
SHA512
28fb585e4c97718557aee2e12b6175e45552a0ef5e5ac58303e41622bf440d2240cadea753b308c0f1b1606b8a73d5cbc8da336f94b0f2430e34a00d0f645ea3
-
SSDEEP
12288:ibeXOhIcac6YGxHF4hXeP81fsA0e8qzYdv1CW9lQB:keX6acZe6f9NJz9KlQB
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-