General
-
Target
BL Draft Copy.exe
-
Size
863KB
-
Sample
230105-hfr2aaee9y
-
MD5
5f76ec4261e9ee6104cadf963e1fdefe
-
SHA1
4bd2b0895e37e92d70f5ae463aafbc7e912cb07a
-
SHA256
41ec6096bbedc3527a97d8a427988cd2885bb23eebefbe17c563a1e5aff52586
-
SHA512
15770c50185e4594f64a2cc16b641093a347845ce68d701b65d3981967ba3f4a797656bcc7d4382d17d358be61dbe53833dfd1e8680af7195768c8e4479324a7
-
SSDEEP
24576:76AnFoJiY3TZ5ae0lVw+BBUWxn48qKoe:7dFW8e0ggBUg9qKoe
Static task
static1
Behavioral task
behavioral1
Sample
BL Draft Copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BL Draft Copy.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
kiamotors-khyber.com - Port:
587 - Username:
[email protected] - Password:
Bno-MD&$40Kjy(Yd
Targets
-
-
Target
BL Draft Copy.exe
-
Size
863KB
-
MD5
5f76ec4261e9ee6104cadf963e1fdefe
-
SHA1
4bd2b0895e37e92d70f5ae463aafbc7e912cb07a
-
SHA256
41ec6096bbedc3527a97d8a427988cd2885bb23eebefbe17c563a1e5aff52586
-
SHA512
15770c50185e4594f64a2cc16b641093a347845ce68d701b65d3981967ba3f4a797656bcc7d4382d17d358be61dbe53833dfd1e8680af7195768c8e4479324a7
-
SSDEEP
24576:76AnFoJiY3TZ5ae0lVw+BBUWxn48qKoe:7dFW8e0ggBUg9qKoe
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-