General
-
Target
tmpb1p5oqt2
-
Size
966KB
-
Sample
221123-mx45dsfc82
-
MD5
274d242327c6e2ca0c6551c154e401cc
-
SHA1
70ca1199fe6294aa3eb076724999a4f5795ddf1f
-
SHA256
707714c25c9050ce571a4decc3b6b10fbf8378ece2b29410397a5450da0e354e
-
SHA512
0fbe2e8536ffe67b3ed20aa3970ab4f88ebe27a1393dae57773b3e58726b5688e9467d4cb0f700f38ec2d5c872da55c7eb7e19edd596e2b0b632ab6aeecf84f7
-
SSDEEP
12288:SYe7V72iNUsZ1DX/VDJARodOjhKn838sy3lcZCyYHOo/2XwNEPbpBv60i2Gxk11l:01uXqdOjhK81y37dOvwaVwY1nHJf
Static task
static1
Behavioral task
behavioral1
Sample
tmpb1p5oqt2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmpb1p5oqt2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
tmpb1p5oqt2
-
Size
966KB
-
MD5
274d242327c6e2ca0c6551c154e401cc
-
SHA1
70ca1199fe6294aa3eb076724999a4f5795ddf1f
-
SHA256
707714c25c9050ce571a4decc3b6b10fbf8378ece2b29410397a5450da0e354e
-
SHA512
0fbe2e8536ffe67b3ed20aa3970ab4f88ebe27a1393dae57773b3e58726b5688e9467d4cb0f700f38ec2d5c872da55c7eb7e19edd596e2b0b632ab6aeecf84f7
-
SSDEEP
12288:SYe7V72iNUsZ1DX/VDJARodOjhKn838sy3lcZCyYHOo/2XwNEPbpBv60i2Gxk11l:01uXqdOjhK81y37dOvwaVwY1nHJf
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-