General
-
Target
4b1c6ffcfbec78b82623868cfe8d5a08a3aafe9430dd4562cd6ba16399647758
-
Size
531KB
-
Sample
241008-qkekrasdnf
-
MD5
ee3e4877fa578a2d3cfda6750b2c5d54
-
SHA1
a0be3816801910f456a4b15f9b1aebaf80f9e2e9
-
SHA256
4b1c6ffcfbec78b82623868cfe8d5a08a3aafe9430dd4562cd6ba16399647758
-
SHA512
c420522aa30423f12a8f94b9ae12854b389abea23d0c2a818bd10e4b4b876f3fa5e65dec883cc6e2fc05f56f2746fced0520af48df30847cf16d0ba92c87fb54
-
SSDEEP
12288:KK99+nc+7/0GL5GLiQ6e3V511XnBu28QzqTkNM8yF:+ncY8GL4L36e/19BufQ22yF
Static task
static1
Behavioral task
behavioral1
Sample
U prilogu je predracun.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
U prilogu je predracun.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.pishgamsanaat.com - Port:
587 - Username:
[email protected] - Password:
Pishgam123456
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.pishgamsanaat.com - Port:
587 - Username:
[email protected] - Password:
Pishgam123456 - Email To:
[email protected]
Targets
-
-
Target
U prilogu je predracun.exe
-
Size
600KB
-
MD5
7805af2fe70854ae49f57b6d3a95e59e
-
SHA1
541d0eb275873c736eb7b80ab1b3619c8c2024dd
-
SHA256
b498a3f4967ef692a331633708f10ac8bbe57579957102bfe751cd479a4cc92f
-
SHA512
031ae4fa84f65a56494cd142163c1ec169b2d6ab347433cbf686e7c31058d2951748c3bc15c5458e02f5153922e062e5dc21334cc9a08421b394772139bc285e
-
SSDEEP
12288:znC0w99+n4+7zVlsIML0qv3V5X1TnluGvy7Y1/xy1q5mE+:Rwyn4YRlsZ5v/XRlutcysEE
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2