General
-
Target
SecuriteInfo.com.Variant.Barys.27469.30346.22408
-
Size
673KB
-
Sample
220913-2rfxyaggf6
-
MD5
1ddb617ccf9bb45f887a9d70fdffd6bd
-
SHA1
722e7c9e7cd517bf03ae537acee7cba7165c603a
-
SHA256
4224a72bf65b59dc526f385a0e2b13adbbb305b0ae3133cbee5a8dcc32ee7d75
-
SHA512
bc2137d66f3760dac16ef6b852575a2715d5adf9f7f46e626880e6f9bd50bbbe5c58ae3158c6d444e258294ee63327d0a8608ace8dd2f0890722caa57cc8c723
-
SSDEEP
12288:SAoQ1izfsWjA2LTJWwc0bYAxPnAcx/ZGp2SGSgrNRca1OEAmD:7PchfJAGhG0RpRjc
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Barys.27469.30346.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Barys.27469.30346.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
kiamotors-khyber.com - Port:
587 - Username:
[email protected] - Password:
WZc&Gm(d-FG_ - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Variant.Barys.27469.30346.22408
-
Size
673KB
-
MD5
1ddb617ccf9bb45f887a9d70fdffd6bd
-
SHA1
722e7c9e7cd517bf03ae537acee7cba7165c603a
-
SHA256
4224a72bf65b59dc526f385a0e2b13adbbb305b0ae3133cbee5a8dcc32ee7d75
-
SHA512
bc2137d66f3760dac16ef6b852575a2715d5adf9f7f46e626880e6f9bd50bbbe5c58ae3158c6d444e258294ee63327d0a8608ace8dd2f0890722caa57cc8c723
-
SSDEEP
12288:SAoQ1izfsWjA2LTJWwc0bYAxPnAcx/ZGp2SGSgrNRca1OEAmD:7PchfJAGhG0RpRjc
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-