Resubmissions

23/02/2025, 18:26

250223-w25q6avndm 10

08/02/2025, 19:37

250208-ybwfxazndt 10

08/02/2025, 19:35

250208-yap8ha1qdl 10

General

  • Target

    snake.exe

  • Size

    15.0MB

  • Sample

    250208-yap8ha1qdl

  • MD5

    60c5cbd6f60daed8a7abfb7f638b108e

  • SHA1

    3207c16104263e27b7f254fb64579d9fc75edf57

  • SHA256

    b127b776864c0627d841484df25166119e6ecd850b619f366db4f24193199dc9

  • SHA512

    2969d3732fb0d812fd8526eef7f6efac6accc18d541dbada4fd12cbf7a707c7e6e0b1d4959071a7aa44d9b0eb7c59658da3fe49150be3731a15d2786e3433976

  • SSDEEP

    196608:dx06NMO0QakwfI9jUCD6rlaZLH7qRGrGIYNeWaGoZy8FUsOnAo9:3r0QEIH20drLYdKZjo9

Malware Config

Targets

    • Target

      snake.exe

    • Size

      15.0MB

    • MD5

      60c5cbd6f60daed8a7abfb7f638b108e

    • SHA1

      3207c16104263e27b7f254fb64579d9fc75edf57

    • SHA256

      b127b776864c0627d841484df25166119e6ecd850b619f366db4f24193199dc9

    • SHA512

      2969d3732fb0d812fd8526eef7f6efac6accc18d541dbada4fd12cbf7a707c7e6e0b1d4959071a7aa44d9b0eb7c59658da3fe49150be3731a15d2786e3433976

    • SSDEEP

      196608:dx06NMO0QakwfI9jUCD6rlaZLH7qRGrGIYNeWaGoZy8FUsOnAo9:3r0QEIH20drLYdKZjo9

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks