General
-
Target
4218d4a03fb87124e33562f14b385c28ea9ef1085b2f389d6da8a2c0dc20ce22
-
Size
764KB
-
Sample
230321-mqrwgshg87
-
MD5
d90d42631511b54444b9cc592e5a4aa2
-
SHA1
0dbd67813ffe59903638e01af41b8517ec6a8459
-
SHA256
4218d4a03fb87124e33562f14b385c28ea9ef1085b2f389d6da8a2c0dc20ce22
-
SHA512
ab8a5fa1f5fd5e6cd9901b8d6093f770dde667a3e99c8d1f57896be7837d9c5e69039587c8ef917442733f58b969758a964d0141849ba8714ec2e9846509cfae
-
SSDEEP
12288:bwV+t09IZrnJtERjxSvfe0+qvwlqxQlUDruQ:bGW09IZrnjQVSvG0+qvU3lU
Static task
static1
Behavioral task
behavioral1
Sample
4218d4a03fb87124e33562f14b385c28ea9ef1085b2f389d6da8a2c0dc20ce22.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
doDHyw%0 - Email To:
[email protected]
Targets
-
-
Target
4218d4a03fb87124e33562f14b385c28ea9ef1085b2f389d6da8a2c0dc20ce22
-
Size
764KB
-
MD5
d90d42631511b54444b9cc592e5a4aa2
-
SHA1
0dbd67813ffe59903638e01af41b8517ec6a8459
-
SHA256
4218d4a03fb87124e33562f14b385c28ea9ef1085b2f389d6da8a2c0dc20ce22
-
SHA512
ab8a5fa1f5fd5e6cd9901b8d6093f770dde667a3e99c8d1f57896be7837d9c5e69039587c8ef917442733f58b969758a964d0141849ba8714ec2e9846509cfae
-
SSDEEP
12288:bwV+t09IZrnJtERjxSvfe0+qvwlqxQlUDruQ:bGW09IZrnjQVSvG0+qvU3lU
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-