General
-
Target
6361756112.bat
-
Size
442KB
-
Sample
220913-wafmysgbc4
-
MD5
3768b1ded511f079d381fd6a8d84e07b
-
SHA1
58099869e673ac7c7e93f42112d346609f7e4ec7
-
SHA256
124da877942b89efd2623e9b1e55d997809efe6fa05f51cc47dd7a1c4ada9dce
-
SHA512
cf7573d68f013f73c7dcbd1f575a4ecb1a353f703c48b8d60344b632585fed8ed2370c220ee14d017e0f6b4b059a094061a8a5ad4493052345cb43cae348d3e1
-
SSDEEP
6144:ZagDvsha/ojUcDSzGBbMo7oc0aewrpSpwlrJiAH:ZagIha/f2FQwUp8rJiAH
Static task
static1
Behavioral task
behavioral1
Sample
6361756112.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6361756112.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.shaqone.shop - Port:
587 - Username:
[email protected] - Password:
pbr[T}c-kZ}lZv9ol7 - Email To:
[email protected]
Targets
-
-
Target
6361756112.bat
-
Size
442KB
-
MD5
3768b1ded511f079d381fd6a8d84e07b
-
SHA1
58099869e673ac7c7e93f42112d346609f7e4ec7
-
SHA256
124da877942b89efd2623e9b1e55d997809efe6fa05f51cc47dd7a1c4ada9dce
-
SHA512
cf7573d68f013f73c7dcbd1f575a4ecb1a353f703c48b8d60344b632585fed8ed2370c220ee14d017e0f6b4b059a094061a8a5ad4493052345cb43cae348d3e1
-
SSDEEP
6144:ZagDvsha/ojUcDSzGBbMo7oc0aewrpSpwlrJiAH:ZagIha/f2FQwUp8rJiAH
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-