General
-
Target
c9057ce0c92adc09a0f2d96884b9c6ef96ed60b991a10516c4596e499377a523
-
Size
763KB
-
Sample
241127-etasdawpdz
-
MD5
da5dc495c3d3c7bf999894f0c5f9aafd
-
SHA1
a0c0bae96acbdd2f059b4f23c4dad28bc41441ba
-
SHA256
c9057ce0c92adc09a0f2d96884b9c6ef96ed60b991a10516c4596e499377a523
-
SHA512
5e5cf3036ad5cfa7ac86ba85f4e9c36e5ecfe20817672e7035443d9e21cfb89c461ccae42ecc3300d61cdcbeb08d0c829fc9977ce0fe8fd68c9231ab738e1a63
-
SSDEEP
12288:lu4XruqNdfgT5bFVvgq+xXLr4Oi48atRUx/yHlc1RqrvjtwOKqyjI6IQztweuKVe:luGgtbFV4q+x/x8Mwec1Rst8UQpkKSuM
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-2411250089.PDF.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER-2411250089.PDF.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
wshrat
http://185.17.40.142:5086
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nbwz jvfz fmek ghid
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
nbwz jvfz fmek ghid
Targets
-
-
Target
ORDER-2411250089.PDF.js
-
Size
1.7MB
-
MD5
06bf8ca73f44aa2aec54c41c4c20d3d3
-
SHA1
9862b9785b61b42dc8fef4e3ecb8319e2d7c7710
-
SHA256
d0ecdf88e56cae4a5c2c759246b97163beb6f63023593a1aee00ee896efe6a16
-
SHA512
84366dd9a5324d8fe98d31383dc13ae52c5a72600afafc1e396416f2b34c6a42db7b09e8571bab343fb894aa7e7b69afcb5542eb8f5f411b570d343288ddd6e8
-
SSDEEP
24576:AuzJmDrkb8kjVaj3cWZUYUNa/US5ZZ2BsiH8pM0:1JmDrkAk9jk/UPd8B
-
Snake Keylogger payload
-
Snakekeylogger family
-
Wshrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2