General
-
Target
file
-
Size
575KB
-
Sample
241209-trq4xatkgt
-
MD5
0f37be8985e3940af919dc35bc4ed779
-
SHA1
2f2a27ec8a249cef7058f9d7a425f8817e67445c
-
SHA256
ee8e3d37fcdeb4590b376bfa53991c9163427a76caea07c32215c8e34a823320
-
SHA512
feaf50abba44f44e272a96690e552bcd960a25009ca20a1bec98d6064dffb749fe0d436892bdabd69d6233641afa355b70a36e9ae2faac282295b6e4efff07dc
-
SSDEEP
6144:NzYBCPvubUOZoL9xh8+62h6vfrxaj0cdJHqBdqOtNYrrDduA49jTr5Mv0eYvw0Xl:xPG7MAqtO4PDkdjn5Q0G0Xl0Vcu9kR
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7692220058:AAEny12fSzuKXI7iNJaESECu5UR80nmwLAQ/sendMessage?chat_id=7342994424
Targets
-
-
Target
file
-
Size
575KB
-
MD5
0f37be8985e3940af919dc35bc4ed779
-
SHA1
2f2a27ec8a249cef7058f9d7a425f8817e67445c
-
SHA256
ee8e3d37fcdeb4590b376bfa53991c9163427a76caea07c32215c8e34a823320
-
SHA512
feaf50abba44f44e272a96690e552bcd960a25009ca20a1bec98d6064dffb749fe0d436892bdabd69d6233641afa355b70a36e9ae2faac282295b6e4efff07dc
-
SSDEEP
6144:NzYBCPvubUOZoL9xh8+62h6vfrxaj0cdJHqBdqOtNYrrDduA49jTr5Mv0eYvw0Xl:xPG7MAqtO4PDkdjn5Q0G0Xl0Vcu9kR
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-