General
-
Target
PU Request Form Hardware.exe
-
Size
736KB
-
Sample
230322-sbk3aabd5x
-
MD5
15764eb449397a0c0a56c093320f4322
-
SHA1
09f2d740790c48d4af8da373ae008567a11ad46d
-
SHA256
9c6a4cf0c130672642be43795905b612d9b351278654c4bfba3cf935e127fa91
-
SHA512
bbdb991f19e1e1228f97ac66c5f7285fef998663a706835258b8351b32ef342f2e97b3f1668d0b7cd85d890d4a3682314f3dae61ffeb35df889c633749df914d
-
SSDEEP
12288:6Bs8Lh/l7aeukNwEx7l+ruMtCEqSKbYncyTBfszq4oqtQH76NKF5xb:yzPukNkqMgMKsnX1Uzq4DuHmkF5F
Static task
static1
Behavioral task
behavioral1
Sample
PU Request Form Hardware.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PU Request Form Hardware.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
}eQA)VL2!$V}
Targets
-
-
Target
PU Request Form Hardware.exe
-
Size
736KB
-
MD5
15764eb449397a0c0a56c093320f4322
-
SHA1
09f2d740790c48d4af8da373ae008567a11ad46d
-
SHA256
9c6a4cf0c130672642be43795905b612d9b351278654c4bfba3cf935e127fa91
-
SHA512
bbdb991f19e1e1228f97ac66c5f7285fef998663a706835258b8351b32ef342f2e97b3f1668d0b7cd85d890d4a3682314f3dae61ffeb35df889c633749df914d
-
SSDEEP
12288:6Bs8Lh/l7aeukNwEx7l+ruMtCEqSKbYncyTBfszq4oqtQH76NKF5xb:yzPukNkqMgMKsnX1Uzq4DuHmkF5F
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-