General
-
Target
clip_image001.exe
-
Size
411KB
-
Sample
230323-gtrf8sdh78
-
MD5
0600fd383dfdc1c13eec78c11c9a848d
-
SHA1
f26e1ed9f1e4a926e613de202318652cdba076ec
-
SHA256
47e8a43a5dfcefe4d6850764bb413ffeab6724be3a37620853b686c9fb23db34
-
SHA512
f5b3492f4e0694f541f08b2979f2e7c68ddb399df7fafdf29bed08e7fc11ed2fe87dc2b803658ea40c424026b38b373ac859d25cd8a116924417a0adb74ae244
-
SSDEEP
6144:8BeMoZqMFv+k0Q8It5gUqJ3PrYx4ePqAeHdKLAdXKEPHihu:ioZqMpB0Qwn3seeuKLAvf0u
Static task
static1
Behavioral task
behavioral1
Sample
clip_image001.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
clip_image001.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.eversafe.pt - Port:
587 - Username:
[email protected] - Password:
Ev3rsaf3_2021 - Email To:
[email protected]
Targets
-
-
Target
clip_image001.exe
-
Size
411KB
-
MD5
0600fd383dfdc1c13eec78c11c9a848d
-
SHA1
f26e1ed9f1e4a926e613de202318652cdba076ec
-
SHA256
47e8a43a5dfcefe4d6850764bb413ffeab6724be3a37620853b686c9fb23db34
-
SHA512
f5b3492f4e0694f541f08b2979f2e7c68ddb399df7fafdf29bed08e7fc11ed2fe87dc2b803658ea40c424026b38b373ac859d25cd8a116924417a0adb74ae244
-
SSDEEP
6144:8BeMoZqMFv+k0Q8It5gUqJ3PrYx4ePqAeHdKLAdXKEPHihu:ioZqMpB0Qwn3seeuKLAvf0u
-
Snake Keylogger payload
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-