General
-
Target
Swift Cfoc 00109839.zip
-
Size
476KB
-
Sample
230519-jspblafe5s
-
MD5
60f1d7ec562490c276e0b9a8ee392ce9
-
SHA1
9b1893dabc419c1e5c7272e7087df175f498f5ea
-
SHA256
5671e8620e226434a8fb98ffcf9f9ea1483c809b774f532453d650a412795cd4
-
SHA512
af4adb2ba3680c181f0cdcae49a940b4b3f6336d78a532adb81ad1c78d028b559aa940bdab27e528282d83d28e4ebc9278cd3525f356e9a33c53e8a6cec3a25b
-
SSDEEP
12288:Pqs9T1guN7pTpyawZXNVrr7hpZq3apq5ZLy6VncpW1OV3F8d:hhNFpJwZ7Fpq5ZLPVWW1eS
Static task
static1
Behavioral task
behavioral1
Sample
Cfoc 00109839.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Cfoc 00109839.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
*3[[5%uK*Zph
Targets
-
-
Target
Cfoc 00109839.exe
-
Size
651KB
-
MD5
6cb10f53add5ee1bfbf0928c9a8412c9
-
SHA1
32d9db653054f39c4af19d9cb45a092d42abed6b
-
SHA256
a5daa13bcab440154c01d336ff4a9dbf4ff40ece572ce781557a47641fe01de4
-
SHA512
b1e3b974ed653abd90b157a2c0045faba107e96e8677b370eb3c8452f04315368bc719a29c827698e1f6206710243a3b38b1faa72e92d7a1694739acc0f00cd5
-
SSDEEP
12288:hqB6dwaYSON8lSEkw5PjRGJmGDpZS3apK5HjhTI61N7:hq0waqNAewtjRG9pK5HjhTI6X7
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-