General
-
Target
DHL SHIPPING DOCUMENT.exe
-
Size
858KB
-
Sample
230208-xe7gxadf7w
-
MD5
692e8d25de4ddeb98806f7343a3e7e19
-
SHA1
654c4a56edcbb55b87ae557fdb8b6bff8d83c64c
-
SHA256
f763cdb07ba3e273fe6010c36b707595684e55c8e14fe14469ce0a4d05488b75
-
SHA512
016be839662e3ad37b1921ab253be34654d0acf0686a0128d6510fb7bb8bd7ade29b275a6eb0c3367eeff9245411dce59ed03c69748950233b5bddcfad47b3c6
-
SSDEEP
24576:zlpDTpXwMYeyse9n06Hd+7yXn+Dl+rtVBlp:z7VwMYeysyn8mX+Dl+B7
Static task
static1
Behavioral task
behavioral1
Sample
DHL SHIPPING DOCUMENT.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
DHL SHIPPING DOCUMENT.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
shivamdevansh.com - Port:
587 - Username:
[email protected] - Password:
=BW-fBRnJV%Y
Targets
-
-
Target
DHL SHIPPING DOCUMENT.exe
-
Size
858KB
-
MD5
692e8d25de4ddeb98806f7343a3e7e19
-
SHA1
654c4a56edcbb55b87ae557fdb8b6bff8d83c64c
-
SHA256
f763cdb07ba3e273fe6010c36b707595684e55c8e14fe14469ce0a4d05488b75
-
SHA512
016be839662e3ad37b1921ab253be34654d0acf0686a0128d6510fb7bb8bd7ade29b275a6eb0c3367eeff9245411dce59ed03c69748950233b5bddcfad47b3c6
-
SSDEEP
24576:zlpDTpXwMYeyse9n06Hd+7yXn+Dl+rtVBlp:z7VwMYeysyn8mX+Dl+B7
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-