General
-
Target
81016f4d0891cae478bae8c06a51aef8.exe
-
Size
734KB
-
Sample
230505-nkhajahg96
-
MD5
81016f4d0891cae478bae8c06a51aef8
-
SHA1
41ae8925b074ae4aa7445a6579f7013bf8b39cc6
-
SHA256
96d19b0d965d8afeb87bd82f3922f80b44224b8eb6b373bafcaeecfba7ea27d9
-
SHA512
72b3a77f1fb0aa786a3d3d94300d82c069ee03c9b9c2d7ac6ce5b2a4019f41847f9af963c5dc07891dc4cd4b498b77d72f8635643353f63a7b90c2c9cf9ac8c1
-
SSDEEP
12288:ce11Kh4YlKtDl0jeEETx6+kcXRn80/ZluwwH3Q43NODUfKu0T/o:pPKhhqDl0RapheF3dmY3B
Static task
static1
Behavioral task
behavioral1
Sample
81016f4d0891cae478bae8c06a51aef8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
81016f4d0891cae478bae8c06a51aef8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
81016f4d0891cae478bae8c06a51aef8.exe
-
Size
734KB
-
MD5
81016f4d0891cae478bae8c06a51aef8
-
SHA1
41ae8925b074ae4aa7445a6579f7013bf8b39cc6
-
SHA256
96d19b0d965d8afeb87bd82f3922f80b44224b8eb6b373bafcaeecfba7ea27d9
-
SHA512
72b3a77f1fb0aa786a3d3d94300d82c069ee03c9b9c2d7ac6ce5b2a4019f41847f9af963c5dc07891dc4cd4b498b77d72f8635643353f63a7b90c2c9cf9ac8c1
-
SSDEEP
12288:ce11Kh4YlKtDl0jeEETx6+kcXRn80/ZluwwH3Q43NODUfKu0T/o:pPKhhqDl0RapheF3dmY3B
-
Snake Keylogger payload
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-