General
-
Target
Invoice PI432980980 .exe
-
Size
911KB
-
Sample
230306-s224gsce3t
-
MD5
0733ec07e63a91058e12a0d75c5351f3
-
SHA1
e26f8710a7aafa43f9c184795abcb1791834ab3f
-
SHA256
86f818237bb4ed674b8d269912dd5063cf141ac7a2f5eba21a186032c471105e
-
SHA512
e16695c897960846f717c0ae6173b4f1c36c7fa254ad09ff70710f601cb24f91385baf39a2fdb5a727517f8b6fdeca53141769518ef11ab3d7ce8f9558fdaecd
-
SSDEEP
24576:/wO1WwW3cOQcOovENi6eq1t2hQ7ig8mD:TPeOovE0oK67tZ
Static task
static1
Behavioral task
behavioral1
Sample
Invoice PI432980980 .exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Invoice PI432980980 .exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.ansssen.com - Port:
587 - Username:
[email protected] - Password:
zbE$)Q^6
Targets
-
-
Target
Invoice PI432980980 .exe
-
Size
911KB
-
MD5
0733ec07e63a91058e12a0d75c5351f3
-
SHA1
e26f8710a7aafa43f9c184795abcb1791834ab3f
-
SHA256
86f818237bb4ed674b8d269912dd5063cf141ac7a2f5eba21a186032c471105e
-
SHA512
e16695c897960846f717c0ae6173b4f1c36c7fa254ad09ff70710f601cb24f91385baf39a2fdb5a727517f8b6fdeca53141769518ef11ab3d7ce8f9558fdaecd
-
SSDEEP
24576:/wO1WwW3cOQcOovENi6eq1t2hQ7ig8mD:TPeOovE0oK67tZ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-