General
-
Target
0d7ee783e7fc08d5fff470efa31bf6eff71e9fd81b2f88a45cbce19bd09bd96d
-
Size
579KB
-
Sample
241213-vrv9asxjgq
-
MD5
b189cde29567c470d79cc7b88bb7f166
-
SHA1
61991e0c44efab03f768ba54160517f693a9addd
-
SHA256
0d7ee783e7fc08d5fff470efa31bf6eff71e9fd81b2f88a45cbce19bd09bd96d
-
SHA512
8b798e2085cf353f6096373628de55e8e6bfa4a098b1e50a581cc4c676926876f5c48c2da252a38fd900bec144b146f574b7426ea35ea0f9060344a83181436e
-
SSDEEP
12288:ZlYqwGpsUpzilsOLxrLSFn9UIDhFWMMLzAGN7K3hY8v/QuTBnw:ZlTwGS3lsfF9UyWZrNwhY83QQnw
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#08799.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION#08799.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.cepro.co.in - Port:
587 - Username:
[email protected] - Password:
2018@ce#03 - Email To:
[email protected]
Targets
-
-
Target
QUOTATION#08799.exe
-
Size
643KB
-
MD5
60ddcafe705a37c0140c4cb0e9c78aad
-
SHA1
f1027a78300c13ca9628a093452fa86c99dc27e2
-
SHA256
cc13129324f50af1beb790648588af51cd58745cc19240836104b5441319ecf0
-
SHA512
4ce31889a8c496c6881520fba3c9caf64323604b9d9d0e45c93282507b7cf60364a36509696b785609e1ba6060001c8ebc4610bd76a0ef105e67136b67539d9c
-
SSDEEP
12288:numPW57u6MJZLtjsZ3x9iVeWErj59NcW23Sh5UCtjWfXl1Ewu3X3u+:nubKrh0hAVerv59NcWl+vl1g3X39
-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2