General
-
Target
http://crissertaoericardo.com.br/images/document.pif.rar
-
Sample
241209-txrydstmcs
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://crissertaoericardo.com.br/images/document.pif.rar
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
27 signatures
150 seconds
Behavioral task
behavioral2
Sample
http://crissertaoericardo.com.br/images/document.pif.rar
Resource
win11-20241007-en
windows11-21h2-x64
12 signatures
150 seconds
Malware Config
Extracted
Family
snakekeylogger
Credentials
Protocol: smtp- Host:
mail.medicaltechexpo.com - Port:
587 - Username:
[email protected] - Password:
Medical*2023 - Email To:
[email protected]
Targets
-
-
Target
http://crissertaoericardo.com.br/images/document.pif.rar
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Executes dropped EXE
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-