General
-
Target
REQ.237.exe
-
Size
609KB
-
Sample
250210-j2yavswjby
-
MD5
9ed9bb78547fb946c2904327ae14d4fa
-
SHA1
398da1a69a7b06daf1ad564e4b7796d9903b3428
-
SHA256
6b9f9c57c5f95587bf894a439c808a0769b52a08d8fc8890d6a96fd6eeab7ff4
-
SHA512
a6dd46dd58285d3bba8e3e4ebcb2d59fc34f37653baa00f55de9d278778d0e55162fc0ce8f09abee27aa70606479a92bc545ab664bc6b094911f449feb40be9a
-
SSDEEP
12288:6oIAbZWUBjYDEQkYJLNRrfFdqlnZNe77Xv4F6GupQqZd7cztT:6AbYUKDEQh91dqlni/FBHOt
Static task
static1
Behavioral task
behavioral1
Sample
REQ.237.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
REQ.237.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Leternel01@
Targets
-
-
Target
REQ.237.exe
-
Size
609KB
-
MD5
9ed9bb78547fb946c2904327ae14d4fa
-
SHA1
398da1a69a7b06daf1ad564e4b7796d9903b3428
-
SHA256
6b9f9c57c5f95587bf894a439c808a0769b52a08d8fc8890d6a96fd6eeab7ff4
-
SHA512
a6dd46dd58285d3bba8e3e4ebcb2d59fc34f37653baa00f55de9d278778d0e55162fc0ce8f09abee27aa70606479a92bc545ab664bc6b094911f449feb40be9a
-
SSDEEP
12288:6oIAbZWUBjYDEQkYJLNRrfFdqlnZNe77Xv4F6GupQqZd7cztT:6AbYUKDEQh91dqlni/FBHOt
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2