General
-
Target
VesselDetails.rar
-
Size
539KB
-
Sample
250328-sqrhlsxybv
-
MD5
b05e6e87b9ef97901e04c26f7de7252d
-
SHA1
a19cf134a3c034be67f05e35c55ca13c7f89354e
-
SHA256
bfb1c7b5e45c1407c35ce2dc11a2b3376df42e03d5c3e3db30937976d8d68493
-
SHA512
917d5a84d83e5ffc04707d3574617bdc8b7ec825ed954422d79c5881e37eb504e3194a7f984ab8da933807daf005404d0cb2987a3d3a548770a15780d5b33763
-
SSDEEP
12288:1pI/DqwkhTiFoGmBghywavgVs19oPFRh6t0reVcfguToPkMg:1pRwkRiFyrwNsEp62reOf5ToPlg
Static task
static1
Behavioral task
behavioral1
Sample
Vessel Details.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Vessel Details.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.asiapcm.org - Port:
26 - Username:
[email protected] - Password:
re4445255 - Email To:
[email protected]
Targets
-
-
Target
Vessel Details.exe
-
Size
587KB
-
MD5
2171680ef08db64f0ced805359738f86
-
SHA1
346302d103cf057ae7b43015a1346ac4a59be939
-
SHA256
da791f0ba7859d019d5ceaf184f2e64df5311e0179decb82678154c158c7095b
-
SHA512
ade149a9521065730687453a0196fe716704f10fd246266ec19ba95429be295dbbc24ed21347fb0616c759598b91ea024c1eb60325a3094466310bbee492b26e
-
SSDEEP
12288:1YmQiKaxG8w2NKgudjntDkkN462b5DDsz7HBLCn2xAkAm3arxx:mmQiE8w2NKgu7K6CsnBLrP3Yx
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-