General
-
Target
d77769fd786498618d69bffa71a5e40d.exe
-
Size
915KB
-
Sample
221202-vqawzagb82
-
MD5
d77769fd786498618d69bffa71a5e40d
-
SHA1
79dc7ba4a10f3bca490ce300e6a766621ec061fa
-
SHA256
9b02e3cc4a73d9073ce484bdbd86bffd07da113b79a73382abccdb9fbe598635
-
SHA512
f78c93bf108b47362315a518eac46af4b64265a5712dfde35f341330b40981bf981faa6ba577e3976fd3609a86d40a3fee37101204c12789facd6ce1d8470b1a
-
SSDEEP
12288:RsETCobS43CZwrQBdmRHWm9ay4K654Mrf7WMSFRwTia38kfS/AzsEEY4:yUCAQexZayemMWM4KTiwAAgEEY4
Static task
static1
Behavioral task
behavioral1
Sample
d77769fd786498618d69bffa71a5e40d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d77769fd786498618d69bffa71a5e40d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
d77769fd786498618d69bffa71a5e40d.exe
-
Size
915KB
-
MD5
d77769fd786498618d69bffa71a5e40d
-
SHA1
79dc7ba4a10f3bca490ce300e6a766621ec061fa
-
SHA256
9b02e3cc4a73d9073ce484bdbd86bffd07da113b79a73382abccdb9fbe598635
-
SHA512
f78c93bf108b47362315a518eac46af4b64265a5712dfde35f341330b40981bf981faa6ba577e3976fd3609a86d40a3fee37101204c12789facd6ce1d8470b1a
-
SSDEEP
12288:RsETCobS43CZwrQBdmRHWm9ay4K654Mrf7WMSFRwTia38kfS/AzsEEY4:yUCAQexZayemMWM4KTiwAAgEEY4
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-