General
-
Target
file.exe
-
Size
683KB
-
Sample
250102-xvyjyavnam
-
MD5
7dff0dedcceb56002189a9ce88cf2236
-
SHA1
7323fe3ec4b682f5d84d353fdec3e66d98e2fefa
-
SHA256
3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8
-
SHA512
ecac885ca6632a9eea74473ed140711c50d236a057b77f8c39b62db29109d64f74cf2e28a2f671be3ad5cfb1be7c4c81344b364711423df648c203e0e7a49416
-
SSDEEP
12288:iyhgIaOq+Ab2H/gV0m13PRUnCKo4nTCHw1TwEAbIWNn0hxHrVkR:3aByCKbWHw1EEAkha
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.dap.vn - Port:
587 - Username:
[email protected] - Password:
KhAnh110886 - Email To:
[email protected]
Targets
-
-
Target
file.exe
-
Size
683KB
-
MD5
7dff0dedcceb56002189a9ce88cf2236
-
SHA1
7323fe3ec4b682f5d84d353fdec3e66d98e2fefa
-
SHA256
3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8
-
SHA512
ecac885ca6632a9eea74473ed140711c50d236a057b77f8c39b62db29109d64f74cf2e28a2f671be3ad5cfb1be7c4c81344b364711423df648c203e0e7a49416
-
SSDEEP
12288:iyhgIaOq+Ab2H/gV0m13PRUnCKo4nTCHw1TwEAbIWNn0hxHrVkR:3aByCKbWHw1EEAkha
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-