General
-
Target
arinzezx.exe
-
Size
751KB
-
Sample
230207-rqapescb45
-
MD5
f95a568151abf6cdbc78288f24352733
-
SHA1
9e8d4ecd93cb80f07f959c850273b83e8066ddaf
-
SHA256
3669f96c22728c600ea409d6a0ebf8f66ee8ca7eaf50a5f1767f2086b7081d76
-
SHA512
6150be1404f34feaa112a80c0e9a4ab15313b4ed04037b5dfa4e33de14018f14bdb37b09033fe3ea7be9dac1e190d1cab8a8f3f31e8a67583c9890e3916a7d4b
-
SSDEEP
12288:hMaBkhgfZIG0UGrJPg/ZsvsbkNENbpOr9k9sb/y9AGFCRshawHRr/CB06KuLp4b8:hM+xfZIG0UGNIhs5abpOu90q9AdKhawT
Static task
static1
Behavioral task
behavioral1
Sample
arinzezx.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
arinzezx.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
arinzezx.exe
-
Size
751KB
-
MD5
f95a568151abf6cdbc78288f24352733
-
SHA1
9e8d4ecd93cb80f07f959c850273b83e8066ddaf
-
SHA256
3669f96c22728c600ea409d6a0ebf8f66ee8ca7eaf50a5f1767f2086b7081d76
-
SHA512
6150be1404f34feaa112a80c0e9a4ab15313b4ed04037b5dfa4e33de14018f14bdb37b09033fe3ea7be9dac1e190d1cab8a8f3f31e8a67583c9890e3916a7d4b
-
SSDEEP
12288:hMaBkhgfZIG0UGrJPg/ZsvsbkNENbpOr9k9sb/y9AGFCRshawHRr/CB06KuLp4b8:hM+xfZIG0UGNIhs5abpOu90q9AdKhawT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-