General
-
Target
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5N
-
Size
131KB
-
Sample
241002-qzkqbayfkl
-
MD5
594c5052fc99e6818a13fed43b4c50c0
-
SHA1
873fea4c018b465c44b1dd8914497df03267ce2d
-
SHA256
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5
-
SHA512
23898bd7b7ce500c95cb42df085c22d82ab0e806dc8c9c2f4d8fb2459e8d25ab533ea8c2f05ccc9540b755fed1b02fc30cb256f813d6594f1c9a0bac8c72809b
-
SSDEEP
3072:6p/hYgDQapNqiSMPTQBkb5yqsYQwv80qgbY:cYcQkQabHzb
Behavioral task
behavioral1
Sample
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
webmail.sventerprises.net - Port:
587 - Username:
[email protected] - Password:
Kspatil@672 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
webmail.sventerprises.net - Port:
587 - Username:
[email protected] - Password:
Kspatil@672
Targets
-
-
Target
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5N
-
Size
131KB
-
MD5
594c5052fc99e6818a13fed43b4c50c0
-
SHA1
873fea4c018b465c44b1dd8914497df03267ce2d
-
SHA256
9d6809e7d22ef036b8b789a20e684c258686cb9afb3899ed89675007621bc3e5
-
SHA512
23898bd7b7ce500c95cb42df085c22d82ab0e806dc8c9c2f4d8fb2459e8d25ab533ea8c2f05ccc9540b755fed1b02fc30cb256f813d6594f1c9a0bac8c72809b
-
SSDEEP
3072:6p/hYgDQapNqiSMPTQBkb5yqsYQwv80qgbY:cYcQkQabHzb
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2