General
-
Target
VesselDetails.exe
-
Size
587KB
-
Sample
250328-rldkhsxsbx
-
MD5
2171680ef08db64f0ced805359738f86
-
SHA1
346302d103cf057ae7b43015a1346ac4a59be939
-
SHA256
da791f0ba7859d019d5ceaf184f2e64df5311e0179decb82678154c158c7095b
-
SHA512
ade149a9521065730687453a0196fe716704f10fd246266ec19ba95429be295dbbc24ed21347fb0616c759598b91ea024c1eb60325a3094466310bbee492b26e
-
SSDEEP
12288:1YmQiKaxG8w2NKgudjntDkkN462b5DDsz7HBLCn2xAkAm3arxx:mmQiE8w2NKgu7K6CsnBLrP3Yx
Static task
static1
Behavioral task
behavioral1
Sample
VesselDetails.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
VesselDetails.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.asiapcm.org - Port:
26 - Username:
[email protected] - Password:
re4445255 - Email To:
[email protected]
Targets
-
-
Target
VesselDetails.exe
-
Size
587KB
-
MD5
2171680ef08db64f0ced805359738f86
-
SHA1
346302d103cf057ae7b43015a1346ac4a59be939
-
SHA256
da791f0ba7859d019d5ceaf184f2e64df5311e0179decb82678154c158c7095b
-
SHA512
ade149a9521065730687453a0196fe716704f10fd246266ec19ba95429be295dbbc24ed21347fb0616c759598b91ea024c1eb60325a3094466310bbee492b26e
-
SSDEEP
12288:1YmQiKaxG8w2NKgudjntDkkN462b5DDsz7HBLCn2xAkAm3arxx:mmQiE8w2NKgu7K6CsnBLrP3Yx
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-