General
-
Target
a9fefe0ab31ab5b1fe58285d812b2b77a88c6a4bb3dee3090feec4bb58833ea9
-
Size
539KB
-
Sample
250122-gdv5gs1qdn
-
MD5
1a60beaa7081fcb3c29e430a6c8e11be
-
SHA1
deef92f1bd3d67d7783b02f1ced4b93a7d69ceaa
-
SHA256
a9fefe0ab31ab5b1fe58285d812b2b77a88c6a4bb3dee3090feec4bb58833ea9
-
SHA512
d9f451f54f87039f51c9e1e746da271a4675bf21f3ab26f10434a8023561d6865245e4348e19df7bcf0683e8046a65033eabdbb5fba42e97ae9c6d968fc87f4b
-
SSDEEP
12288:f83Yedq5oDawgwmsqFYTJKEbYSwGXefmKFNR2Tq1agI3seC1Q:fsldaDsEO+Sp+4UYo1Q
Static task
static1
Behavioral task
behavioral1
Sample
MB267382625AE.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MB267382625AE.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.murchisonspice.co.za - Port:
587 - Username:
[email protected] - Password:
accounts786q#
Targets
-
-
Target
MB267382625AE.scr
-
Size
628KB
-
MD5
f43238bfb93550676c942b1253179f07
-
SHA1
bfccd20fb37ff85ba836c618f15d2ad03f91b75d
-
SHA256
51d68a04bd95b48dae0d4298e23c09e5c32cc6c91297c5ff2d92dbd4f598207d
-
SHA512
9948f8bd3597a1129735558741339b1d7643ca7afdb26f194ee7368a4b9e326d6e161cf4072a950a5d79ad6a403b03ec7c112dde339a4a5fa7903bcc8f911c6d
-
SSDEEP
12288:dhLKWa+kia+qO9rdc6T5hMhtn7ojsC4mKFNlou61:Bk/5IT5CDn7oLYoj1
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2