General
-
Target
4579986544567SK.exe
-
Size
222KB
-
Sample
230505-ng6hyshg54
-
MD5
03583de9c0aab8903f5033c70ec95121
-
SHA1
24d128bae985a8e0709e4d867510756adbc52d3b
-
SHA256
21bb03f0edc9d1584da0a469bad83726ed17ce463aa2570d1c2ec74b23d22bcf
-
SHA512
c603c421ea4fa6c72338b9796b9b19e0452fcc69be82e376ab909e35c2b04e43922b9eedcfcc5eb7b59b5059689f7482f77e98e836400b64f5184d28c1d31b3c
-
SSDEEP
6144:sQsL+qO8mibCoPxL1GL37oSPs0YJQBfS1apMc4:yO8mPoPxL1GHoStCQBfS1apMc
Static task
static1
Behavioral task
behavioral1
Sample
4579986544567SK.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4579986544567SK.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
[email protected] - Password:
010203sienka++ - Email To:
[email protected]
Targets
-
-
Target
4579986544567SK.exe
-
Size
222KB
-
MD5
03583de9c0aab8903f5033c70ec95121
-
SHA1
24d128bae985a8e0709e4d867510756adbc52d3b
-
SHA256
21bb03f0edc9d1584da0a469bad83726ed17ce463aa2570d1c2ec74b23d22bcf
-
SHA512
c603c421ea4fa6c72338b9796b9b19e0452fcc69be82e376ab909e35c2b04e43922b9eedcfcc5eb7b59b5059689f7482f77e98e836400b64f5184d28c1d31b3c
-
SSDEEP
6144:sQsL+qO8mibCoPxL1GL37oSPs0YJQBfS1apMc4:yO8mPoPxL1GHoStCQBfS1apMc
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-