General
-
Target
9a4d80d06be8acf452a13fbff5540cc48bd1089021d0978b41f5bdd68fd9d4a2
-
Size
255KB
-
Sample
230313-l59jeabh3y
-
MD5
465414e2f8414080f56984d4ccee3051
-
SHA1
e3ad9e185139d44ccab979aab6e63c74e45b8954
-
SHA256
9a4d80d06be8acf452a13fbff5540cc48bd1089021d0978b41f5bdd68fd9d4a2
-
SHA512
32299ab1bf32e331cfde33d21a8118dc3565cc352acbb121fb306ab4abc792bca0aa46e1e4bfb67f7f1ffb20f09643cc56fee9dc018693452ce8a3cb2b6d580b
-
SSDEEP
6144:/Ya6QiE7vjSczxzjgErdBsmv7LQKFxjQixn8F7LJ4V:/YWFjrxzjgERBHzLZxHiR+V
Static task
static1
Behavioral task
behavioral1
Sample
9a4d80d06be8acf452a13fbff5540cc48bd1089021d0978b41f5bdd68fd9d4a2.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
9a4d80d06be8acf452a13fbff5540cc48bd1089021d0978b41f5bdd68fd9d4a2
-
Size
255KB
-
MD5
465414e2f8414080f56984d4ccee3051
-
SHA1
e3ad9e185139d44ccab979aab6e63c74e45b8954
-
SHA256
9a4d80d06be8acf452a13fbff5540cc48bd1089021d0978b41f5bdd68fd9d4a2
-
SHA512
32299ab1bf32e331cfde33d21a8118dc3565cc352acbb121fb306ab4abc792bca0aa46e1e4bfb67f7f1ffb20f09643cc56fee9dc018693452ce8a3cb2b6d580b
-
SSDEEP
6144:/Ya6QiE7vjSczxzjgErdBsmv7LQKFxjQixn8F7LJ4V:/YWFjrxzjgERBHzLZxHiR+V
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-