General
-
Target
21102024_1616_21102024_SEM2024000002383.rar
-
Size
683KB
-
Sample
241021-tq2t1s1arj
-
MD5
a7c300c92c1fa7bc2db7046cf3840dea
-
SHA1
b4624f6227d893e36f4f8bc17b94328e80c0ef34
-
SHA256
52cb62fc662748b8c1f47a84629908d91ce13ee370683086a7932b45423d612e
-
SHA512
e7bef5699949c06fc4ebb122e22575b047114f9934ae6255ad81c5f0c95f0c776cf708511f86d54eacc3425234bf3a1c6b8ee405b1ac838753e7fb7f4bbfffa5
-
SSDEEP
12288:5fd1FyUI0weJa9rj/XjTv6TL/lIJVwiagcRmAPhW+Zyf7dWvFEk9GFVuSdd:5fdDlIWa9rj/XiTJIJqi7cmAP1yfocHD
Static task
static1
Behavioral task
behavioral1
Sample
SEM2024000002383.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SEM2024000002383.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Synligstes84.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Synligstes84.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7840943707:AAFvjApaxzyzfiy9tTVH4n-N6k-rIeMo504/sendMessage?chat_id=2129508827
Targets
-
-
Target
SEM2024000002383.exe
-
Size
748KB
-
MD5
06fa51d68f2545f28a2b942b01a4bb13
-
SHA1
74fb1ce042c1982155d6d190b446dd429c7ad463
-
SHA256
fb79dfe6e2eebbe7882d3e688ff377c3ffcfc8d41f35e1af16f224846f4fab5b
-
SHA512
a11d5b3fccfc2cf03913903382b2521b609bd2d798d50e6b151c8a88f1cb835456e0f1ace18c50037de6b93c656f51b88e783fb42b80b38fd3be0d772cc5c773
-
SSDEEP
12288:jG6QMVyGP0Fx53cAA0jGnheowOyGOs61IYZVAecgs9FMa1Mdq8jJM:jG6QtGP0OhsGnheowDGMIYO7MoOM
-
Snake Keylogger payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Synligstes84.Hig
-
Size
53KB
-
MD5
453a8e6a5068ae5a2e5d99de31a13b3b
-
SHA1
9f202a5b9a8cf1ae90030e14ea99c4e787338ede
-
SHA256
4ac6b7ddcc88b43191a8e1329e632c3246b10dcd077b1e79efa2f0559cafa7f6
-
SHA512
37b6296b2434b1791d7e709d17cd8bcce6d8111505648b63227e1004461de31d07922497ed80be4e6ab115ece2964394cf6a3c1b26725a3da2fa0bb3cf7cac46
-
SSDEEP
768:GgwhUiC0xg3ABPAquhRXdzx0upGLv4rMdpnLh3AHtDeXqfEF8zommDR/q+UjEadh:mUiKwhuxzxJpavgq0DeXqf7oYPXEw
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2