General
-
Target
622cc8e52c54af2da4ff1c114f71c6949b3d0f900c83931a9141bc7f91937166
-
Size
829KB
-
Sample
221223-f73wrabb3x
-
MD5
e15b286f87699f605f729fe3e19eb086
-
SHA1
9553fcfd2f8a02499cf18478986c2a37efe6dd01
-
SHA256
622cc8e52c54af2da4ff1c114f71c6949b3d0f900c83931a9141bc7f91937166
-
SHA512
b9d42a8b4b7300ba06ce6d00d84caeb8dfd4e8b3dddae92794f35528b165111342b8b05250eeacdeccba9c149b349d20b7d1073d13d98eee9ce9c50b470f0ba7
-
SSDEEP
24576:ynFdELpCybniAU6nrhXOLX1OYCJYZE3QbkAc7QH80:4FdELpCybniAU6rhXOZvCJcE3Qbkf
Static task
static1
Behavioral task
behavioral1
Sample
622cc8e52c54af2da4ff1c114f71c6949b3d0f900c83931a9141bc7f91937166.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
622cc8e52c54af2da4ff1c114f71c6949b3d0f900c83931a9141bc7f91937166
-
Size
829KB
-
MD5
e15b286f87699f605f729fe3e19eb086
-
SHA1
9553fcfd2f8a02499cf18478986c2a37efe6dd01
-
SHA256
622cc8e52c54af2da4ff1c114f71c6949b3d0f900c83931a9141bc7f91937166
-
SHA512
b9d42a8b4b7300ba06ce6d00d84caeb8dfd4e8b3dddae92794f35528b165111342b8b05250eeacdeccba9c149b349d20b7d1073d13d98eee9ce9c50b470f0ba7
-
SSDEEP
24576:ynFdELpCybniAU6nrhXOLX1OYCJYZE3QbkAc7QH80:4FdELpCybniAU6rhXOZvCJcE3Qbkf
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-