General
-
Target
CustomerRequest.exe
-
Size
924KB
-
Sample
250219-s4nc4stpcj
-
MD5
af70a8bace079f5eb7762fbbec4772ab
-
SHA1
ae3530a619d587110da7beb2b1511ad3dc44a325
-
SHA256
a69b613b4c99988b72e10c917489d5a7006b53abc75f7706b578e8b27f3252ab
-
SHA512
43255e9e7aed50ed988f24fa34884dea9e26c91ff3da75d096b08724c2fa8bd999d2011ada57912c0ec3af9c994cb3f7b64bf51b68d815b0c43a73a29d151936
-
SSDEEP
12288:om52Xb1I6UDWd+qi0lMv+el/2ih4VqFiTGgtBj5wkR:omoXb66UCdLdMmeB2iyG6V3
Static task
static1
Behavioral task
behavioral1
Sample
CustomerRequest.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CustomerRequest.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7967054436:AAEM9PFKBirZzrcJ_AQreC9wDTN-AOtN0uM/sendMessage?chat_id=5007084465
Targets
-
-
Target
CustomerRequest.exe
-
Size
924KB
-
MD5
af70a8bace079f5eb7762fbbec4772ab
-
SHA1
ae3530a619d587110da7beb2b1511ad3dc44a325
-
SHA256
a69b613b4c99988b72e10c917489d5a7006b53abc75f7706b578e8b27f3252ab
-
SHA512
43255e9e7aed50ed988f24fa34884dea9e26c91ff3da75d096b08724c2fa8bd999d2011ada57912c0ec3af9c994cb3f7b64bf51b68d815b0c43a73a29d151936
-
SSDEEP
12288:om52Xb1I6UDWd+qi0lMv+el/2ih4VqFiTGgtBj5wkR:omoXb66UCdLdMmeB2iyG6V3
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2