General
-
Target
ed1420f9f2247b8c6d968787af2dc71266abd66a282f7103a6525113e3084a59
-
Size
584KB
-
Sample
250127-wfemvazmfx
-
MD5
b1252ec208fb9065afc44c43da6b258f
-
SHA1
da465232b8083749cf0c2702c3babe3880cee83a
-
SHA256
ed1420f9f2247b8c6d968787af2dc71266abd66a282f7103a6525113e3084a59
-
SHA512
6f5a5206c851585e738c45a8a74112f9d564ef89e3646c0319aa29e2b93b6be821afec71b8c2d2bd5d67457c685a2f6bb6faf52b8086067e20acc1c776cb1ef5
-
SSDEEP
12288:F/zbniaP9LTnr5FMQbi7SSZ++SGsOwk8pT+UZFvTPsBiOm25UFgcBZT3O5:F/viaPVnr5FMQbi7SSuOwk2dLsNo/BZG
Static task
static1
Behavioral task
behavioral1
Sample
PAGO SWIFT pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PAGO SWIFT pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828
Targets
-
-
Target
PAGO SWIFT pdf.exe
-
Size
869KB
-
MD5
a1279890aeb8abe7f5f043b844c37610
-
SHA1
f499167373d11cfd9f006e32ba493dea460876cf
-
SHA256
ac3e59d452c9afd22e61846b9f5d1b475c0fb1e9ee0a890dea660a61280bce57
-
SHA512
54a0b3563ccb793e1940b2b18989b39e99feee47b4f180d569ded5f8e848f70c18e0e4a1f83ac5dd3250f5852d77138ded558f5ec71e8445456002f9709d111c
-
SSDEEP
12288:xd0N/PDnN55KQbbjQZEiAGaYwUyNLIUZBvTPEviFZEhmDL1xIrZlXXLRuAUY6IkB:r0BLnN55KQbnQEYwUsDLEIE0D
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-