General
-
Target
SMK_15092022.exe
-
Size
376KB
-
Sample
220915-hh68zsfhck
-
MD5
d9bff9930496047451f5770d88e3a52a
-
SHA1
c8ba0c6ae14305d40b15d66b1461ae8a0fdb295c
-
SHA256
9e92f7b80ee4c8621bb79fc1118fa2f57cd3afb6c5e43a26ac7f87d21bd9a0e7
-
SHA512
6a4118a68af437673621e386eeb8fc290069687411989f61a2604fa3ae12104aa6addb221f5ecbf23923fb8b27dbaf09266d5822b9c257077ae96f27691b09a0
-
SSDEEP
6144:eiveYyVDkzmmMHNMZsKd/HRiJjBysi+Bf:eive5VDkqmqNMsKdvRiRgiBf
Static task
static1
Behavioral task
behavioral1
Sample
SMK_15092022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SMK_15092022.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.hemegas.es - Port:
587 - Username:
[email protected] - Password:
@Bastilipo1 - Email To:
[email protected]
Targets
-
-
Target
SMK_15092022.exe
-
Size
376KB
-
MD5
d9bff9930496047451f5770d88e3a52a
-
SHA1
c8ba0c6ae14305d40b15d66b1461ae8a0fdb295c
-
SHA256
9e92f7b80ee4c8621bb79fc1118fa2f57cd3afb6c5e43a26ac7f87d21bd9a0e7
-
SHA512
6a4118a68af437673621e386eeb8fc290069687411989f61a2604fa3ae12104aa6addb221f5ecbf23923fb8b27dbaf09266d5822b9c257077ae96f27691b09a0
-
SSDEEP
6144:eiveYyVDkzmmMHNMZsKd/HRiJjBysi+Bf:eive5VDkqmqNMsKdvRiRgiBf
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-