General
-
Target
2df3f7d23fd60b25f0e90b1b3f58c49fecf96e0d7b947e421a741511f4625cc5
-
Size
560KB
-
Sample
250219-fk6dcsxpal
-
MD5
0a40757586aa557e45286a66ce0389e8
-
SHA1
746c3234ff31d04e9b79f0990ba3f2f0535d3afd
-
SHA256
2df3f7d23fd60b25f0e90b1b3f58c49fecf96e0d7b947e421a741511f4625cc5
-
SHA512
0a8ad663f21b7bc3ddf5677ddfc5bd2f32f1d5e68a04cf02cbb4e63d17dd4a9d14436897625574f7ca76cfa9aa030cce1cf2685be732ffe65ad801404dccca00
-
SSDEEP
12288:LZt/JOe4tVrMiAQkJhzsRWevwVMd/R8F0GrAr:dFrWLOsY4wmh+GAe
Static task
static1
Behavioral task
behavioral1
Sample
newwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
newwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k/sendMessage?chat_id=5217421430
Targets
-
-
Target
newwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.exe
-
Size
652KB
-
MD5
a43a4806314ffe1f7c12b70d5e67166d
-
SHA1
86ff15c0da292046c678c7ca0f1d41da4d7e26a8
-
SHA256
1d894e62095e10035f72fe5a081a4762247363d1ff9829b1d198cf992d0e04d2
-
SHA512
1823fbec230799c35ff89dac236cc81947e41aac6fb8c7ccc6bd9c96866d2de14c584baece197ac324c578fb396b52d9ffd4beec6b38e911be3f12b4667d9ab8
-
SSDEEP
12288:jfTbnb4QzjVHnLM2IQcJhRsX8evMVMj9ocqpsQAHMKZ:33Vtass4MmIyQe
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2