General
-
Target
SWIFT COPY.exe
-
Size
1.3MB
-
Sample
221004-ltc13aaea7
-
MD5
04fb95451359b9ee4e7556cd83d6bbe0
-
SHA1
b680633e9e101e6c01a87c8928c9d6e788166d80
-
SHA256
877073f9199362934c812fcfe877c8f134ef7fdd9c60c0973dcee2dbb889438e
-
SHA512
de1f826150f227ad1f0da6d693ff848b7abe9c1f648a310bcd0fcdf925fc3fb1736f5c9ff69c8401ce191c91a429f048e2f1558799b923f51e0052f678795ac2
-
SSDEEP
12288:qnjoIFQLAnWZQzjFeM6DJOjB9sTTHyATJCL0s0s/T1neuSwBajqaUTRpEAmD:YnYQb6VO2JCL22So3
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SWIFT COPY.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
shrisailogistics.com - Port:
587 - Username:
[email protected] - Password:
nfBD8_x.@Om)Btw147 - Email To:
[email protected]
Targets
-
-
Target
SWIFT COPY.exe
-
Size
1.3MB
-
MD5
04fb95451359b9ee4e7556cd83d6bbe0
-
SHA1
b680633e9e101e6c01a87c8928c9d6e788166d80
-
SHA256
877073f9199362934c812fcfe877c8f134ef7fdd9c60c0973dcee2dbb889438e
-
SHA512
de1f826150f227ad1f0da6d693ff848b7abe9c1f648a310bcd0fcdf925fc3fb1736f5c9ff69c8401ce191c91a429f048e2f1558799b923f51e0052f678795ac2
-
SSDEEP
12288:qnjoIFQLAnWZQzjFeM6DJOjB9sTTHyATJCL0s0s/T1neuSwBajqaUTRpEAmD:YnYQb6VO2JCL22So3
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-