General
-
Target
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe
-
Size
666KB
-
Sample
250220-edyt9swkbz
-
MD5
1dbb57ad5743adcf6646c6bed197a69c
-
SHA1
25a3c047670712001579460e8567ef7a1bfa5a79
-
SHA256
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23
-
SHA512
2d6e97380163bb4b277a4556eb3f73a522494e4a55a29317ecda871eab035de4f9c7e9f022f6b04f116fe76e22257a8a8a229abaf9e5470ce0981dbf3e7f26ca
-
SSDEEP
12288:piEbnb4wZEtbuVPIloZoCjeYCVnEvqtheNG3SmZkR:drytb6AloH6YQv6Q32
Static task
static1
Behavioral task
behavioral1
Sample
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8041256307:AAGam3kL48795R3YlIMnfOOfK-_9BlCA7qg/sendMessage?chat_id=2135869667
Targets
-
-
Target
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe
-
Size
666KB
-
MD5
1dbb57ad5743adcf6646c6bed197a69c
-
SHA1
25a3c047670712001579460e8567ef7a1bfa5a79
-
SHA256
b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23
-
SHA512
2d6e97380163bb4b277a4556eb3f73a522494e4a55a29317ecda871eab035de4f9c7e9f022f6b04f116fe76e22257a8a8a229abaf9e5470ce0981dbf3e7f26ca
-
SSDEEP
12288:piEbnb4wZEtbuVPIloZoCjeYCVnEvqtheNG3SmZkR:drytb6AloH6YQv6Q32
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-