General
-
Target
c830ccca377bdb6b649bf9b3e6169e17989905906ef4b7d20150af8ef52d5f91
-
Size
541KB
-
Sample
250210-gelbnssjgn
-
MD5
5007b7823374a016f30ce3030ee37d5b
-
SHA1
e4d71e2bc324ae12c92326d29c983819600dc0a0
-
SHA256
c830ccca377bdb6b649bf9b3e6169e17989905906ef4b7d20150af8ef52d5f91
-
SHA512
64027e79f0ea33fe56a0f2174fde8a6f1d5e97e02100fcd5d08f81f49ae8310b4a3bdba796c8be13aa2b159f3315c0a1fa6e059bc2d814b1e39618997c79d775
-
SSDEEP
12288:a2mSNv302tvmtYFdqvs7M8We7/gwtm1by0Fv1yd:aqx3/9tdqvs7x9A1jFC
Static task
static1
Behavioral task
behavioral1
Sample
Attached Invoice.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Attached Invoice.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Leternel01@
Targets
-
-
Target
Attached Invoice.exe
-
Size
609KB
-
MD5
9ed9bb78547fb946c2904327ae14d4fa
-
SHA1
398da1a69a7b06daf1ad564e4b7796d9903b3428
-
SHA256
6b9f9c57c5f95587bf894a439c808a0769b52a08d8fc8890d6a96fd6eeab7ff4
-
SHA512
a6dd46dd58285d3bba8e3e4ebcb2d59fc34f37653baa00f55de9d278778d0e55162fc0ce8f09abee27aa70606479a92bc545ab664bc6b094911f449feb40be9a
-
SSDEEP
12288:6oIAbZWUBjYDEQkYJLNRrfFdqlnZNe77Xv4F6GupQqZd7cztT:6AbYUKDEQh91dqlni/FBHOt
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2