General
-
Target
64ac5a54b0716963fe7b8c608275a993a61a45516e8451e78d874d2c5f449798
-
Size
482KB
-
Sample
241209-a4ag5s1qdk
-
MD5
ffe737328f0138812eeee47d19faf301
-
SHA1
3f2a90fa0422c342e7ab7590385d65dbb4d0641c
-
SHA256
64ac5a54b0716963fe7b8c608275a993a61a45516e8451e78d874d2c5f449798
-
SHA512
b35d959c7feaf7de5db492cce01da6819c0086e82cec6abcb45717568f7c83ab514fec94134e120e2f7adafa39029fec03a4f77b818ad81ebd0c003e5ebb8859
-
SSDEEP
12288:wpjoWFvY3S3CMxw18uvi/68traMn5inENPb0wYSkmH2R1kbarSDy:8joWFvYYCxCuK/6Q52coY2wGN
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#00870.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION#00870.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.cepro.co.in - Port:
587 - Username:
[email protected] - Password:
2018@ce#03 - Email To:
[email protected]
Targets
-
-
Target
QUOTATION#00870.exe
-
Size
489KB
-
MD5
bcaf6fb2575efdf1334df47b0cb72622
-
SHA1
9cb5f2577cc721010eba85f06ecae540a6ddf46d
-
SHA256
5a9a4bb850b87e2e12608197e67e9f25cb2d85f802739f5d223407e10d658568
-
SHA512
353a9c4eecee8b99ec35863549a13fcaff73b8d95f6c592b1f4b356d06d67fa08466c58d3a86840615d3e3dc302d57ffebe2ae73fbe105ddaefc0aa758f94979
-
SSDEEP
12288:9roPi5P5h+KFiYudUZ0Gq8lucLcDil+s39Wo3y7NUYEUQyTzK8b6E8aFAA12:BoPizYyV0ncLsil+s39Wo6NUYhBTXb6p
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2