General
-
Target
Nº 180071974.7z
-
Size
312KB
-
Sample
230601-qtc4aaee33
-
MD5
9fc6a3e9ad2db97012f8686dd28ba44d
-
SHA1
c0c07031a5fdca19c6edf160db07121c3c252a13
-
SHA256
f054cb7a60752d7c6da00cba3c0d2a351ef8321e749d4d0d07927a1f45b336b7
-
SHA512
9826a0952ae57506b91a56a5638d139c309a9663dd6544b1198b95f0b0c0dd55bf34ffcc65aae60af1134f15957897d7bf7c15d2dc1c86c01f8c2fd99249ecfc
-
SSDEEP
6144:WxLqoPrxR3w5t3UpPS/9yDwNUhAg686fRH4vyyXl0BrrmWtAVQmoh/OfrUoIu:SWo1ROkpa//NN86fORl0ddYhG/OwK
Static task
static1
Behavioral task
behavioral1
Sample
Nº 180071974.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nº 180071974.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.rampelloelectricidad.com - Port:
587 - Username:
rampello@rampelloelectricidad.com - Password:
raulruben55 - Email To:
coachfundraising1@yandex.com
Targets
-
-
Target
Nº 180071974.exe
-
Size
583KB
-
MD5
a1d2b08ee432c2e3d4920008814d97ac
-
SHA1
8140db54e2dfaf44712d354edf9d04aebb994278
-
SHA256
c945108e9c0367fe7bc7777e206196b0064148191b0e9f867e93d8fe84b2e87b
-
SHA512
8cfff82343839763f67773d26cafbed826a2b94cc94aeccbea2692f1895f1e2581b74c250494e30abf1a7aa2f23408ff0404b428a3911ecb96b6ca41fc73a192
-
SSDEEP
12288:iZXo8k47LVYmCADj0PqhgJP/1qnNQYTwvJ:iZXomK2yaA
Score10/10-
Snake Keylogger payload
-
StormKitty payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-