General
-
Target
db4c9f78490f0152cd750980db402d610c42157e240faf1287d84ad3e5d9026b
-
Size
525KB
-
Sample
250122-fdxgwazlaj
-
MD5
9a3b83590f7ebc979c46a2aafaf2f9a9
-
SHA1
92fad03448c21c20d434a79966d893648ce84875
-
SHA256
db4c9f78490f0152cd750980db402d610c42157e240faf1287d84ad3e5d9026b
-
SHA512
cb6a1a5107367e0917bd5d18a5b12febade79a2252b23d7565120fd547f4aaa1174f066454663f964ced4a5a14bd3e1a71a521a1eefcbcc3be353b46d6580867
-
SSDEEP
12288:kSb9s5BGj/xAZlBxlDhjRL3TKgKaqJIM7mpFbcHvB7kc2mk5:b9o8j/xArB3FjRL32gKXmpc1v2m4
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 194960.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order 194960.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232
Targets
-
-
Target
Purchase Order 194960.exe
-
Size
625KB
-
MD5
92514a6ef5868dd0dbba559a12ccb68c
-
SHA1
9dbacede171405c46debfe2cc40128ddc731103b
-
SHA256
862a46281deaadf07f5ce4d2e40efef9949326a8e5622cf2d412ec962a833195
-
SHA512
e8a6a09488a4c59bb317c6d166d4a8aa69e4e5dc012dd88de8b5e4688b97f5039ad0189e4e0a2c28de4e0bac1ed0b1e0c90e9f1a49bdb588cfa84a6427ab733a
-
SSDEEP
12288:7nLHWa+ka4ZQhiSaHOMMv0VCwpGpF4aOMbjfAJ7/R8nZrfvxrs7oQBXe:4kmhAHgsgaGpEMbjC7/R8nZrfwoQk
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2