General
-
Target
zz.zip
-
Size
161KB
-
Sample
250210-fpk8zsskfz
-
MD5
8cb889389679a4fe04430e99def003fe
-
SHA1
a0e1cb36a61cd6574f08bccde3fd60d91b283f1a
-
SHA256
5b90e64b275d76dc50a6b9c85f5eb89f0f1d2686eb93f997aecf6b74d4f84710
-
SHA512
edf76d772c9a7973158dcc91f5a7c0f45c4c151774a751c174dee3e99a0e747d65103eca825ec6ac26ecdb5509b74b2139001f5c6144be8e4dc239f66ca01c3c
-
SSDEEP
3072:iUBpohKE0xLXlb/D+bodcCyLkrz07TrnAcSx2JZw31KxUasi1NO9U:iUBE2lbqLLUzUTrnJJY1KzFNOU
Static task
static1
Behavioral task
behavioral1
Sample
zz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
zz.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8146065464:AAFmO8RMLpJgd1BLjqm9MO8V-EzP0a6-JD4/sendMessage?chat_id=6306771742
Targets
-
-
Target
zz.exe
-
Size
223KB
-
MD5
4553428c99b70e4ace08ecb833ee644f
-
SHA1
331c4abfccce4b65d5b4430e668942058959c5db
-
SHA256
d95ce0d32f940b2178e218b9af0aae7bdaf25f8660dc2112e4ca22e10b5f7451
-
SHA512
2f9b8c8db5005e8bdac84b865639a60e422a0c2ef5c5bf92774e5d339d226df6b758f5f3ebaf09e187673bd3a7fef8e576f471d1167001ac6a1a2d94951933ee
-
SSDEEP
6144:6DKW1Lgbdl0TBBvjc/qUTrV9JYR2p7Xbc:8h1Lk70TnvjcyAF5c
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2