General
-
Target
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe
-
Size
641KB
-
Sample
250202-dgdststqaq
-
MD5
7f84318e750fcb83738f9ad23bbecfe8
-
SHA1
45039f494513cc91bc0ef398c013989cde717673
-
SHA256
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44
-
SHA512
397c344da1a1d631ca2e6e00db3fa5f04cf12de74324bf84cbb60abfa4ede5ad45175af2639abba1375d990a76d3cb685e06138bde34ddb70f652682c3dd9b2d
-
SSDEEP
12288:xOFtByqfpHJJdgib+TCUIGr8ocdn3+2SF2SOd:xKI0ppJJ+ToncSd
Static task
static1
Behavioral task
behavioral1
Sample
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://50.31.176.103/ - Port:
21 - Username:
[email protected] - Password:
HW=f09RQ-BL1
Targets
-
-
Target
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44.exe
-
Size
641KB
-
MD5
7f84318e750fcb83738f9ad23bbecfe8
-
SHA1
45039f494513cc91bc0ef398c013989cde717673
-
SHA256
39261de9a81fa1b2f36e7b9dba7f3a9558dff25ce0b49ce11d709550f2ab9c44
-
SHA512
397c344da1a1d631ca2e6e00db3fa5f04cf12de74324bf84cbb60abfa4ede5ad45175af2639abba1375d990a76d3cb685e06138bde34ddb70f652682c3dd9b2d
-
SSDEEP
12288:xOFtByqfpHJJdgib+TCUIGr8ocdn3+2SF2SOd:xKI0ppJJ+ToncSd
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2