General
-
Target
Description.rar
-
Size
1.2MB
-
Sample
250117-nzkn7swrfj
-
MD5
d57433d03f01f6205260f9e68a5cf61e
-
SHA1
744075a7f4cefd6c5b6165185075f715e1cb93ce
-
SHA256
99708cebaf8533fccab62718d43c6c1cdfdcb48640c423306a894dfbdc519b85
-
SHA512
4a7fbb0a4766c5d5b6c4e91c096e25790926644e4d2cbdc1de2372d3abd40a04513eef732efd912f329c9e05bf3c134bbca4ff6eaa81c42363c802f16877e3c7
-
SSDEEP
24576:TMNGSZVkogM7vl02PPyL3S3mfUJyZGWG3BdCkh5wbZu4Q:TUGGSs7dDPyLiWfuywWoBYQ
Static task
static1
Behavioral task
behavioral1
Sample
Document desription.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Document desription.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkvision
acuweld.ddns.net
Extracted
snakekeylogger
https://api.telegram.org/bot7666772215:AAG3oWDDhgYedd4yOneZp0AStrhY_tgTlTc/sendMessage?chat_id=5830304904
Targets
-
-
Target
Document desription.exe
-
Size
1.3MB
-
MD5
42e5f44b46f5a582a85829236ba2c2c8
-
SHA1
d733b18d85baead3612710bbd7965f17f96b22c4
-
SHA256
6f5273caf722986c373fd330354161fa8140201f41b0edec092700ab2ed463e3
-
SHA512
70ad0cd995d1fc3602190d27c0f53a17e4c342d270998205f69c1e9b3cebf019d45e312542a852ac0921bff41a9b5584d4d8d36543712fe0c7507644134daad7
-
SSDEEP
24576:aQejQy4n+DF3BwDEXWxCVsdRG9zGE5jDkyY7abKv35NXGbEJOa7lgE:dAQy4duWxKsd49z9jS7rGUZ
-
Darkvision family
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-