General
-
Target
tmp
-
Size
924KB
-
Sample
230322-z2qtsadd3s
-
MD5
fe05605a8065764a5ec8aba32db6e697
-
SHA1
389a4e7840726f7a47573e3939c608739b68f103
-
SHA256
8d13301deb6ab177620d38718648a0efb851eabf26b708a388abab7b7daf41d1
-
SHA512
9929532e7bfe8094d9bc902423e2d9ba2e8cab5e739fcd920eed3ea82c12e769776fbf75ba8ba0fdc4830152963ba0be0ba32b2876d39edbed1ba481bda9d39b
-
SSDEEP
6144:qNr+2+AQu6rl4UE0rZU6dGwcJPv+sLQwMRe1ryQV5RZBxRwZZ0PDNQsQRjGgBUPv:qNrZ+oelflhIh5TxSHBUPyF
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
doDHyw%0 - Email To:
[email protected]
Targets
-
-
Target
tmp
-
Size
924KB
-
MD5
fe05605a8065764a5ec8aba32db6e697
-
SHA1
389a4e7840726f7a47573e3939c608739b68f103
-
SHA256
8d13301deb6ab177620d38718648a0efb851eabf26b708a388abab7b7daf41d1
-
SHA512
9929532e7bfe8094d9bc902423e2d9ba2e8cab5e739fcd920eed3ea82c12e769776fbf75ba8ba0fdc4830152963ba0be0ba32b2876d39edbed1ba481bda9d39b
-
SSDEEP
6144:qNr+2+AQu6rl4UE0rZU6dGwcJPv+sLQwMRe1ryQV5RZBxRwZZ0PDNQsQRjGgBUPv:qNrZ+oelflhIh5TxSHBUPyF
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-