General
-
Target
00938374.rar
-
Size
508KB
-
Sample
221017-s263faccc8
-
MD5
bbbabc4d78ec3846a04303293c99aaa8
-
SHA1
0818394e75fe22650b57d911e4b97e2aa8d055ab
-
SHA256
afd392239889b1539cf39e18fa7f25a7a0fa8fa61fcd93a60ecc807b7716b13f
-
SHA512
7dd4cd0887dec143003a4f04efa68c90335c0e5c139321d80eb212a81ab7851ef6d73d542c6a3d37fdd31c1d7a7cf6ea5af8794551102b2c3d8a227520ac57ca
-
SSDEEP
12288:YPY8+oq7nHObjI4w1xg8mvsotYdFWg1ZUhFopTfQHTq9oKa:sY8ucd8mvszdFt1ZUs1QWWKa
Static task
static1
Behavioral task
behavioral1
Sample
00938374.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00938374.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
eV*hBZc1 - Email To:
[email protected]
Targets
-
-
Target
00938374.exe
-
Size
809KB
-
MD5
26f34dcbb5e144fb1d55e2b7ae9e6eb9
-
SHA1
85b5039d320669ceb664362b02451e2cc0d2a891
-
SHA256
c76ab20e58193b2d01eab39426138c5e7fea3e7260523f48546aebaebe703239
-
SHA512
34a173e2ea290f54e08716939065f5a4affb20f7406aa1c88aa6a97dcf02964d7eacd0e829ff18ce319a6debec99b479e6dc80542df0d92420624581c2e892f1
-
SSDEEP
12288:3/RA/TCnwdvzvGRXx+5gKB4a/0dB5sWHNsjs/:3/RG8w9iRh+D8dB5sW
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-