General
-
Target
DYFRN_file.exe
-
Size
844KB
-
Sample
241209-tyrn1stmew
-
MD5
5e2725e6fc1948c0f8d7044bdbf5218a
-
SHA1
ab0f3415c6cd7f3ca2a1e935910a4801face7d99
-
SHA256
e51e7b073e5fa3832455c7e87ccd3bbc7dd1dd3c72cf0bb273f1e24adec6ce92
-
SHA512
dac35ed58a28d8df099a088a77ca8960e38d4e51a9149d68e96ed8f2bd9fdf0e449f7226fafc004c28e151370a356fe164493470262c1e0cfb87425cf1d2d731
-
SSDEEP
12288:mUnNezvoYK6g7B/7SDmX6a+xKCOmNOoqwBrMyU+Jiqa/M/kR:1IzLK6g7QSKzxLNOxwZMyUeBFa
Static task
static1
Behavioral task
behavioral1
Sample
DYFRN_file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DYFRN_file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7692220058:AAEny12fSzuKXI7iNJaESECu5UR80nmwLAQ/sendMessage?chat_id=7342994424
Targets
-
-
Target
DYFRN_file.exe
-
Size
844KB
-
MD5
5e2725e6fc1948c0f8d7044bdbf5218a
-
SHA1
ab0f3415c6cd7f3ca2a1e935910a4801face7d99
-
SHA256
e51e7b073e5fa3832455c7e87ccd3bbc7dd1dd3c72cf0bb273f1e24adec6ce92
-
SHA512
dac35ed58a28d8df099a088a77ca8960e38d4e51a9149d68e96ed8f2bd9fdf0e449f7226fafc004c28e151370a356fe164493470262c1e0cfb87425cf1d2d731
-
SSDEEP
12288:mUnNezvoYK6g7B/7SDmX6a+xKCOmNOoqwBrMyU+Jiqa/M/kR:1IzLK6g7QSKzxLNOxwZMyUeBFa
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-