General
-
Target
987654345678SK.exe
-
Size
243KB
-
Sample
230522-ke97kshg7y
-
MD5
c7dd9baa8edc8390acae1409db63a5f0
-
SHA1
0549b987268a417a3cded255c691c1b06d9bcab6
-
SHA256
f471bb104b1ae05e5e786e5f17577f5a199d36b2e39dc6b9c4a5ead9e54960d8
-
SHA512
ce7c87f8fbc1965b7df16e9137a78d947413892f45d963da7047145f596f7d6db9f214379251f80af159db5e86c793b3680ed1c6e934d843c0b13d92da53a5f3
-
SSDEEP
3072:+R/CFu2f+gKbye2cV6mpb5uck0X19PPF1wabhGM6ejQQbThzf6XC+f6OK+oXH:QsL+Ny2V6mpb5Rp9gEkM6vQshK+oX
Static task
static1
Behavioral task
behavioral1
Sample
987654345678SK.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
987654345678SK.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
[email protected] - Password:
010203sienka++ - Email To:
[email protected]
Targets
-
-
Target
987654345678SK.exe
-
Size
243KB
-
MD5
c7dd9baa8edc8390acae1409db63a5f0
-
SHA1
0549b987268a417a3cded255c691c1b06d9bcab6
-
SHA256
f471bb104b1ae05e5e786e5f17577f5a199d36b2e39dc6b9c4a5ead9e54960d8
-
SHA512
ce7c87f8fbc1965b7df16e9137a78d947413892f45d963da7047145f596f7d6db9f214379251f80af159db5e86c793b3680ed1c6e934d843c0b13d92da53a5f3
-
SSDEEP
3072:+R/CFu2f+gKbye2cV6mpb5uck0X19PPF1wabhGM6ejQQbThzf6XC+f6OK+oXH:QsL+Ny2V6mpb5Rp9gEkM6vQshK+oX
Score10/10-
Snake Keylogger payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-