General
-
Target
SWF-023204-05130-1512447TIB2200.xlsx
-
Size
224KB
-
Sample
220930-mkzddadcd3
-
MD5
8dc8559bc73d36b6452f7d2c4ec548c7
-
SHA1
1e3cfb666066c7141aaf122250b877ed1a62803a
-
SHA256
27435cceb1045a305d063a93aa25cacfbb3658eb15e0abf2edb0d6d23c097f76
-
SHA512
7219fd8c53d4969c9db18a4c5b0101259f8a41f9c567190e18a8a9eab41ee39f2cf9547966882d87cebe6f1816e9ab92c74b7ca97cd36a3221e177c775fb48bf
-
SSDEEP
6144:nJKnnZ4VMkhBmpn2aMwDCTtkErlAuHtulE8:4nZYLWn2aM46kklAuN58
Static task
static1
Behavioral task
behavioral1
Sample
SWF-023204-05130-1512447TIB2200.xlsx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SWF-023204-05130-1512447TIB2200.xlsx
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
doDHyw%0 - Email To:
[email protected]
Targets
-
-
Target
SWF-023204-05130-1512447TIB2200.xlsx
-
Size
224KB
-
MD5
8dc8559bc73d36b6452f7d2c4ec548c7
-
SHA1
1e3cfb666066c7141aaf122250b877ed1a62803a
-
SHA256
27435cceb1045a305d063a93aa25cacfbb3658eb15e0abf2edb0d6d23c097f76
-
SHA512
7219fd8c53d4969c9db18a4c5b0101259f8a41f9c567190e18a8a9eab41ee39f2cf9547966882d87cebe6f1816e9ab92c74b7ca97cd36a3221e177c775fb48bf
-
SSDEEP
6144:nJKnnZ4VMkhBmpn2aMwDCTtkErlAuHtulE8:4nZYLWn2aM46kklAuN58
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-