General
-
Target
38a438d09edf7467e43391a188afe0e2d0e1cc24a4920caf58acf3f17dedd56c
-
Size
755KB
-
Sample
220930-mxff2adch6
-
MD5
5e9e2eb6215f644d0d634adbcb4d4477
-
SHA1
890710d84cfe60a8826681e4bb07f023f7d72bad
-
SHA256
38a438d09edf7467e43391a188afe0e2d0e1cc24a4920caf58acf3f17dedd56c
-
SHA512
515ab1c97e46f72b9c4c48d5d1b5e47931b256d1c6a1829ce6c4aa64c7ce095e9b38478addb7d9bd67725406f87ca27f2621eb4a3d864f5c88f3a75e19fd5d92
-
SSDEEP
12288:Td96vOOPjmbhz9afncUmktuAkWJBv5alPO8AHspRDMS7P8M8nAR2HFESPeXrKHa:TQmRBUHvLvAlPO8VpRl8nA8
Static task
static1
Behavioral task
behavioral1
Sample
38a438d09edf7467e43391a188afe0e2d0e1cc24a4920caf58acf3f17dedd56c.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
hQyUHXY0 - Email To:
[email protected]
Targets
-
-
Target
38a438d09edf7467e43391a188afe0e2d0e1cc24a4920caf58acf3f17dedd56c
-
Size
755KB
-
MD5
5e9e2eb6215f644d0d634adbcb4d4477
-
SHA1
890710d84cfe60a8826681e4bb07f023f7d72bad
-
SHA256
38a438d09edf7467e43391a188afe0e2d0e1cc24a4920caf58acf3f17dedd56c
-
SHA512
515ab1c97e46f72b9c4c48d5d1b5e47931b256d1c6a1829ce6c4aa64c7ce095e9b38478addb7d9bd67725406f87ca27f2621eb4a3d864f5c88f3a75e19fd5d92
-
SSDEEP
12288:Td96vOOPjmbhz9afncUmktuAkWJBv5alPO8AHspRDMS7P8M8nAR2HFESPeXrKHa:TQmRBUHvLvAlPO8VpRl8nA8
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-