General
-
Target
見積依頼.zip
-
Size
531KB
-
Sample
241016-adzdkstdla
-
MD5
0a910c017f4195cc4837f337bf946910
-
SHA1
49d2f9aff195204eaafb605f70815230d15f9164
-
SHA256
28c5f7a70f7b7cbd238467322531d8f7bbca1731389dca610711ed17397ea924
-
SHA512
0b7d8e7a25a70f6ac8e6d7a1a2b8cbe4c78f541fcbf91fdba53a698cc7a4a86884c77dc4da5b384141e7fe6fd3bc8fbd898f496abf4efea22f549b8c1b828b08
-
SSDEEP
12288:tDLLNZqObS2JYUwvxiqPSrQ1ftFxd4b3ZCKtWlVl54is6w6v4lBSDWSWue51:tDLWUJ1CpPSs1ftFP4DwKWlxsQESWueL
Static task
static1
Behavioral task
behavioral1
Sample
見積依頼.exe
Resource
win10-20240404-ja
Malware Config
Targets
-
-
Target
見積依頼.exe
-
Size
617KB
-
MD5
ab710965b2eab728f4fefc66995ca7e2
-
SHA1
d7279c173f5c08b7bc39916fdaf65f48af41e88e
-
SHA256
6e3fef37f80b4afe593fcacf78134e27d939866a7f3291bdafac411e2b31abef
-
SHA512
4330f7017dbec8530c014062e23e5feee606193e5ff7610d7ee8d89c222e7f4d23339444db94155df2183c8ab5a966dcd46e62bc43d2fb128243b12471e45b02
-
SSDEEP
12288:cLEiJY0wvx4+dSrQo4OnOjkEkGxnXrl8WTG4m:WPJjC4+dSsXOnOj46n9T
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2