General
-
Target
f02ef41bb5325c5ae2a5923a7dee230d.exe
-
Size
539KB
-
Sample
230215-qxeraabh78
-
MD5
f02ef41bb5325c5ae2a5923a7dee230d
-
SHA1
ce1a97e9b2d7d708621bad086a311600bbe1e8de
-
SHA256
4bae43ed39ce2256e4125bbb217fe624635e1fe4e7a9d662be36d15ec3d0d660
-
SHA512
8b045e3c80944abdb07d45db60a845a269c9abccbe4729248e9f8c4f46499ba7afeb3228dfc7a915999d7a823cd768e04202f0171dbaf5dd192b18ee6f867e8f
-
SSDEEP
12288:JXJyeB2gCvIb5/9pKd3Hw0MLzSp2q1R4Pd8yU4gyt2r89+zO9Aez:DyY2pol9SNMLO5R4OL4f8pe
Static task
static1
Behavioral task
behavioral1
Sample
f02ef41bb5325c5ae2a5923a7dee230d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f02ef41bb5325c5ae2a5923a7dee230d.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
f02ef41bb5325c5ae2a5923a7dee230d.exe
-
Size
539KB
-
MD5
f02ef41bb5325c5ae2a5923a7dee230d
-
SHA1
ce1a97e9b2d7d708621bad086a311600bbe1e8de
-
SHA256
4bae43ed39ce2256e4125bbb217fe624635e1fe4e7a9d662be36d15ec3d0d660
-
SHA512
8b045e3c80944abdb07d45db60a845a269c9abccbe4729248e9f8c4f46499ba7afeb3228dfc7a915999d7a823cd768e04202f0171dbaf5dd192b18ee6f867e8f
-
SSDEEP
12288:JXJyeB2gCvIb5/9pKd3Hw0MLzSp2q1R4Pd8yU4gyt2r89+zO9Aez:DyY2pol9SNMLO5R4OL4f8pe
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-