General
-
Target
Attached P.O.exe
-
Size
647KB
-
Sample
250210-wvwvns1kdj
-
MD5
01678283a7d176068d9941f6b40b1421
-
SHA1
500f7b1cc45843106664fa75258bfb7ea88018b3
-
SHA256
9704feee0716616c0b6fc608c7cfd69d780e9f9867a130209c92732124d4f514
-
SHA512
67c9bfc0b5e40f6c52a5d5e848fb9621fd4bbe2174926a7abe91fdd468cffbaf78c2496fbbcda7ec6183c6e2f4e89b3eecb39f9f52ef0048f61191425df2cf18
-
SSDEEP
12288:l6+wIZTSL5oaovT2lPK7Ji7Sxf8ncleeSuOYbzNH/rs0dFEVinRCYkIo:s+wIZTkg2BKE+f7ljS+/vLk
Static task
static1
Behavioral task
behavioral1
Sample
Attached P.O.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Attached P.O.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Leternel01@
Targets
-
-
Target
Attached P.O.exe
-
Size
647KB
-
MD5
01678283a7d176068d9941f6b40b1421
-
SHA1
500f7b1cc45843106664fa75258bfb7ea88018b3
-
SHA256
9704feee0716616c0b6fc608c7cfd69d780e9f9867a130209c92732124d4f514
-
SHA512
67c9bfc0b5e40f6c52a5d5e848fb9621fd4bbe2174926a7abe91fdd468cffbaf78c2496fbbcda7ec6183c6e2f4e89b3eecb39f9f52ef0048f61191425df2cf18
-
SSDEEP
12288:l6+wIZTSL5oaovT2lPK7Ji7Sxf8ncleeSuOYbzNH/rs0dFEVinRCYkIo:s+wIZTkg2BKE+f7ljS+/vLk
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2