General
-
Target
Swift 52,000USD.xls
-
Size
503KB
-
Sample
230207-vkpg6sga4t
-
MD5
f995ee6cf1282fcd570b490a55b17355
-
SHA1
e0d2ed2412eb4d09c9a2f05612c01ab93e75af03
-
SHA256
5589bcfad3eb74dac48659c6353f72b4a3aede02382d92f3180dc895181446d6
-
SHA512
9f9a0c1b3a5f7e7030a548df35da48721fadce673a1864950e8c9b0488eb5843e4b6aab0e6dd6e682b6359f5484e176300a5a55cbd7bb4d3c37b01f3b1b03d73
-
SSDEEP
6144:C90rC6zzXaMANkizCBDEk2sG3figF8ESbuQq9c+DS+5T+Z+RwPONXoRjDhIcp0fy:CF935TH8Cuou3y
Static task
static1
Behavioral task
behavioral1
Sample
Swift 52,000USD.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Swift 52,000USD.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
^!uJBr^9 daniel
Targets
-
-
Target
Swift 52,000USD.xls
-
Size
503KB
-
MD5
f995ee6cf1282fcd570b490a55b17355
-
SHA1
e0d2ed2412eb4d09c9a2f05612c01ab93e75af03
-
SHA256
5589bcfad3eb74dac48659c6353f72b4a3aede02382d92f3180dc895181446d6
-
SHA512
9f9a0c1b3a5f7e7030a548df35da48721fadce673a1864950e8c9b0488eb5843e4b6aab0e6dd6e682b6359f5484e176300a5a55cbd7bb4d3c37b01f3b1b03d73
-
SSDEEP
6144:C90rC6zzXaMANkizCBDEk2sG3figF8ESbuQq9c+DS+5T+Z+RwPONXoRjDhIcp0fy:CF935TH8Cuou3y
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-