General
-
Target
09012025_1058_08012025_Contract_0103.bz
-
Size
621KB
-
Sample
250109-m3bd9szpbp
-
MD5
290e6ed37acdc6de0a4ec3a9d1730795
-
SHA1
0dcf5c85e27448098ab99530e3ba1544b8f805f6
-
SHA256
9341ed285a5e894095430766621508822d6973ef98bfc442336de526c8ad762e
-
SHA512
d6e1ec8c15d568f1937c65f6863f84b0e7c216ee0b982fc13b36938f5a18804b9581ad05a30532f3b302872d1ed81b3011ad989ba0293a0e8f94c38c7fad8199
-
SSDEEP
12288:9t429YjI3lynWUzPFJ0N/VjHDhmOB682FXDfz16T3guGSx0TjjpbEZNe:ijI3dU7g/VjdmOBq6T3g9XaNe
Static task
static1
Behavioral task
behavioral1
Sample
Contract_0103.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Contract_0103.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.murchisonspice.co.za - Port:
587 - Username:
[email protected] - Password:
accounts786q# - Email To:
[email protected]
Targets
-
-
Target
Contract_0103.exe
-
Size
705KB
-
MD5
c83ee1a2f029b861a6a66ea25e2ae356
-
SHA1
97b083bf9f6b797d328bc37f43eabcfdd007c3eb
-
SHA256
e4f2a7707dc8781db5279fef6f56adf628981b82c6b9640f82af0f7decce8626
-
SHA512
113764c1599dafc25b5e3d5ab1aafe5dfc62cf1b832e6f6794f19cace61cb9ac5b35f3c19e25a0f536f2539ed07d3a462ebb3bfc04bd293ad7f62e39a337cd96
-
SSDEEP
12288:wIq4E6mfJiLl9yWcbQkpClSxCxC61F9SDc8GFXDfL16T3gu+kx0TpvpKRZNi2L:DEkD+pCljC6X9WG6T3g1JRw
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2