General
-
Target
tmp
-
Size
645KB
-
Sample
230423-dnfk1aaf33
-
MD5
e7fba7dcb3b477cf88780bc5dfeb2c07
-
SHA1
68075208681e7eb4f89e1976c8d92cb2deaf4246
-
SHA256
8df3a1cb9299783e8f886323f5ee7e6ff2a50c0585857076650d5e918b0ece7f
-
SHA512
62126759d540f5198f6f334323be8f6a9de36152672b0745b7e306b4a366c4dd4496e64d9ca7cfc8695a96b4d6edd079422fc1a7260164f8dc5738f13494309e
-
SSDEEP
12288:mg+loi1HerVJ4iiuu402sBM6NBs8HwFmx9xzqfAloUbpsQr4:b2HUL4ieR9xHhRz1logpsL
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.clubraqueta.es - Port:
587 - Username:
[email protected] - Password:
8mj8AYlo8jkSUoj - Email To:
[email protected]
Targets
-
-
Target
tmp
-
Size
645KB
-
MD5
e7fba7dcb3b477cf88780bc5dfeb2c07
-
SHA1
68075208681e7eb4f89e1976c8d92cb2deaf4246
-
SHA256
8df3a1cb9299783e8f886323f5ee7e6ff2a50c0585857076650d5e918b0ece7f
-
SHA512
62126759d540f5198f6f334323be8f6a9de36152672b0745b7e306b4a366c4dd4496e64d9ca7cfc8695a96b4d6edd079422fc1a7260164f8dc5738f13494309e
-
SSDEEP
12288:mg+loi1HerVJ4iiuu402sBM6NBs8HwFmx9xzqfAloUbpsQr4:b2HUL4ieR9xHhRz1logpsL
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-