General
-
Target
New Purches Order.zip
-
Size
528KB
-
Sample
250217-mncnsayjhq
-
MD5
3ee0e00084a436ad5f6eb25ab5aee41b
-
SHA1
faf0b56d4ad51b6473575c7d727e642afe9f7efd
-
SHA256
96c32325b07758af2a66e76fc8ef7c7d81752cd78476b731476e52ce51292bf4
-
SHA512
1d7f9ecff9aa1ba1d41d116be909eba949d4db135e7a4a40e878621470156e05ad253e24ae0b3dada1ccc1a30e5db8c96ace04ab92e18ee7783eb09d6d7309e5
-
SSDEEP
12288:9+SMBZjkbkRSyX3TZOnBcU+PoTvULRaGs3a6Q0CeMNHKVOtZ29gGEpczX:gFZjkb3iDs+taGIa6kfHKoOBd
Static task
static1
Behavioral task
behavioral1
Sample
New Purches Order.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
New Purches Order.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7891452286:AAE2oLBQvjY6qRrkalPPxinaMdSDDJEY_C8/sendMessage?chat_id=7225431807
Targets
-
-
Target
New Purches Order.exe
-
Size
613KB
-
MD5
60158da472c90a2c923bf79be848b8d3
-
SHA1
8b8de08cfab42c95c60613a91ce71e90b8c51913
-
SHA256
faa8850d8a28a308c917200981a80bcc481cb089f804f6867a4608a28bf0b2b5
-
SHA512
dd6a9d12c75eaea593f63e2bccd6ca8add0061d31d22abee4fd5f01ff35af2e94b01f3eb6846023955b812c425fa7ef78e46deca37ed8d1e494589dfe3e5557d
-
SSDEEP
12288:yxgmiFTt9XakdciLNU/Z0Xa6QqIWMNHKpOtZyLWLP7VSR:G4HtaMLahKa6CXHKcGEP
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2