General
-
Target
1d1dca99dcade53932e9f73158aecc0e73ea274a1c05d3cb7005a34d3957af23.7z
-
Size
510KB
-
Sample
250219-c6g14sxjy4
-
MD5
75f22ca0711f7a912b28c50cf15b08a5
-
SHA1
be4cf31ffd6f6e6629581512dcbd09646fc1db0c
-
SHA256
1d1dca99dcade53932e9f73158aecc0e73ea274a1c05d3cb7005a34d3957af23
-
SHA512
bfc2ea7abbf5d367127ad553152f02ce2451b4b94c69c2111370a09ef4ca5eec380735319f96ce8cecf3bb4aedcf852308d9e7c5ba4a756ef24e5f01e7850062
-
SSDEEP
12288:dRwzxK9q4FdbxRXdFzPFwPiYj4wHU/iZmRNsVT+mqPx6N6Kk+ycR/0woWpa:d6zxK9q4F5jNwPiYjaNN6TUp6Nrk/MZa
Static task
static1
Behavioral task
behavioral1
Sample
beenieT.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
beenieT.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7465931215:AAEEB2buL-YODXHMy33u4S1TgD90QPF6Te0/sendMessage?chat_id=7519150590
Targets
-
-
Target
beenieT.exe
-
Size
627KB
-
MD5
01adfbc94da06851348026ba175876f4
-
SHA1
afab7627513aeab150cb27609e2ee3ddf3062c8e
-
SHA256
027704a79bc8bc9533c0d2d20c15ff824be56a280512e2305ac66dea22e91f70
-
SHA512
93dc93dcd9d87afc731258aaedb999776dcbe5421116f9ad71dae54f9ec8ccfaca02c80a212a04d16391f4ed6530b5f46c4554ada935d940b0f2fe163a174771
-
SSDEEP
12288:6xgmXcBFdytRXdvtaFFPiYK41HU/iZqRNyVTZlqPxUN6Kk+ycR/3w2FirEukR:uZAFQnmFPiYKJZNcTipUNrk/92Qk
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2