General
-
Target
Fatura_SUN2023000003827.exe
-
Size
448KB
-
Sample
230216-h9ja8sgd86
-
MD5
04cc0750fc2e0ff6e81b4530e940f512
-
SHA1
82127102bb8725405d9416293fb2496c7c9d8b3e
-
SHA256
554fcafce29b66cc2dd33cff1e49f7d2c45f4e154c1f08bcb15d5aae3ad4ec1c
-
SHA512
b14cc7f0dbbc91ca295d80b471ea438854394189bafae9e4a8356674b0fa7cfe0254c0db7dd3181b95227b75d0be1cd63e54c8e4169d13b63379165622a7e07b
-
SSDEEP
6144:SYa6H/tW0PDPehrAG+7OELO94O7CQDmwv8bi/:SYd/ttLP0ri7OwO9zC4tUa
Static task
static1
Behavioral task
behavioral1
Sample
Fatura_SUN2023000003827.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Fatura_SUN2023000003827.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
Fatura_SUN2023000003827.exe
-
Size
448KB
-
MD5
04cc0750fc2e0ff6e81b4530e940f512
-
SHA1
82127102bb8725405d9416293fb2496c7c9d8b3e
-
SHA256
554fcafce29b66cc2dd33cff1e49f7d2c45f4e154c1f08bcb15d5aae3ad4ec1c
-
SHA512
b14cc7f0dbbc91ca295d80b471ea438854394189bafae9e4a8356674b0fa7cfe0254c0db7dd3181b95227b75d0be1cd63e54c8e4169d13b63379165622a7e07b
-
SSDEEP
6144:SYa6H/tW0PDPehrAG+7OELO94O7CQDmwv8bi/:SYd/ttLP0ri7OwO9zC4tUa
-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-