General
-
Target
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb
-
Size
819KB
-
Sample
250221-11hx8atkv4
-
MD5
94ca91b1058fcd0b1b54d772045a74aa
-
SHA1
25ff1d41a1ea88cc4fb204668f21ce005ae40f6b
-
SHA256
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb
-
SHA512
2a9409f9d024eeaabb34f73c4e964b5e3dd4d6b422ca4c93eb1be378e39ae8675ebc872084a808a1caacc0812a7556eb955ff75ad00b9b798145dde9ce7e92f5
-
SSDEEP
24576:b865MWNnpbraRwVYXPR4u/WShS4X37PF:gyMWNnEuVY54y7hS837d
Static task
static1
Behavioral task
behavioral1
Sample
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7570158401:AAGzmritmTT3Z0Z77i4ThJMCq3NzbjqeNpo/sendMessage?chat_id=7225431807
Targets
-
-
Target
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb
-
Size
819KB
-
MD5
94ca91b1058fcd0b1b54d772045a74aa
-
SHA1
25ff1d41a1ea88cc4fb204668f21ce005ae40f6b
-
SHA256
31ac48414fc2df4410f5256b563cfac9b34a3b55f3acd34c021696f19b135ceb
-
SHA512
2a9409f9d024eeaabb34f73c4e964b5e3dd4d6b422ca4c93eb1be378e39ae8675ebc872084a808a1caacc0812a7556eb955ff75ad00b9b798145dde9ce7e92f5
-
SSDEEP
24576:b865MWNnpbraRwVYXPR4u/WShS4X37PF:gyMWNnEuVY54y7hS837d
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2