General
-
Target
1007b9ca338ee5413f2f9eee4eee6f52ed2a0c44d84276b1d5fbfc5fe2124969
-
Size
784KB
-
Sample
250218-dc2zvswner
-
MD5
bfb2deffd989acf1b174e60de7c84884
-
SHA1
c8985d5dd77484902e04d56367b1cbc5ecb9ffc6
-
SHA256
1007b9ca338ee5413f2f9eee4eee6f52ed2a0c44d84276b1d5fbfc5fe2124969
-
SHA512
7cd0057a3ba85ac62cc227f2bd6756b42fb356f19545e2f354986bbe0a578fb97a65714281f6d63d9b106921ea59f7d98bb8c59b724781bf33a1cfc9b2544af0
-
SSDEEP
24576:Mnn2ygT7yZQTO32HyfZXJJLnkv4LCIbLes93LtA:BDT7gcyfZXJJTkv4tb3xA
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
New Purchase Order.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7891452286:AAE2oLBQvjY6qRrkalPPxinaMdSDDJEY_C8/sendMessage?chat_id=7225431807
Targets
-
-
Target
New Purchase Order.exe
-
Size
886KB
-
MD5
762df27b4f94d6df4e6530b55fd1a8d5
-
SHA1
62d1f3ad9b1f7b589eb6b0b55da548e91c794fbc
-
SHA256
db52ee4039b781a52a7a3708ec7cad8c745d5c5ee41505ec05dae7fbf662f121
-
SHA512
35f041e4d131d213882ae2a2556fa319299e67d1c4efd0e46076e0df49ed0e78c09b09d6874de6889f3573c3df7a2ca4696a30832d385512989bb4be4737a5c1
-
SSDEEP
24576:ZqLeA2+ET7p2Ni32HI9jXjNDqTO6FIN453L/:NVTBcI9jXjNDR+IN2
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2