General
-
Target
Week4.exe
-
Size
184KB
-
Sample
250210-1xw1nszrgy
-
MD5
624401070bba5e7be70e21e3da0a1b45
-
SHA1
c4ea9df10fc2043b917d6276e39b7bb4639c251d
-
SHA256
668e51b1f586bbd6b1d35890299933ea7cfa2cd62c47febb11ed2db5726bebfc
-
SHA512
5b1b17b413378349731b31a5462e002dc8ae044fc0a2d94d6564af465002badd6e214d0d754b7fe583cdcf3a91b23ab680a6c0349550ef1baef7933240bfe2a7
-
SSDEEP
3072:Q2lYlqsF8A8OgMz1b71qLwBgnVg5M4qRrVzPNnqaHIEAybY:+/NbpsnVgXQzPNJH3zb
Behavioral task
behavioral1
Sample
Week4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Week4.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.status-automation.com - Port:
587 - Username:
[email protected] - Password:
bkkhoostatus2018 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.status-automation.com - Port:
587 - Username:
[email protected] - Password:
bkkhoostatus2018
Targets
-
-
Target
Week4.exe
-
Size
184KB
-
MD5
624401070bba5e7be70e21e3da0a1b45
-
SHA1
c4ea9df10fc2043b917d6276e39b7bb4639c251d
-
SHA256
668e51b1f586bbd6b1d35890299933ea7cfa2cd62c47febb11ed2db5726bebfc
-
SHA512
5b1b17b413378349731b31a5462e002dc8ae044fc0a2d94d6564af465002badd6e214d0d754b7fe583cdcf3a91b23ab680a6c0349550ef1baef7933240bfe2a7
-
SSDEEP
3072:Q2lYlqsF8A8OgMz1b71qLwBgnVg5M4qRrVzPNnqaHIEAybY:+/NbpsnVgXQzPNJH3zb
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2