General
-
Target
order6566546663.exe
-
Size
643KB
-
Sample
230601-sjjjesfc6t
-
MD5
8a728a201ff4eebc956d8747c0b689e8
-
SHA1
94fe365f40c34e83e39a4c81c7cf9319d7cfa6cc
-
SHA256
0807202daf2095810fdbc78ccf60ed83368e84da1f89d7215f9bac6590b40b7d
-
SHA512
318b968f5ce9a3caf4a2664bcc6c355463ad78fb65c09cb054ac3fd00e65f7ea454bdb7b9577c6743a01c540eca57b6527708a9008926ae8c10737231ac8511b
-
SSDEEP
12288:ioEP/SJasDrhUVMJ5kjDZCwbX9PblDCkIcxWMB:A/4pDfGDYuRblDC7cxW
Static task
static1
Behavioral task
behavioral1
Sample
order6566546663.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
order6566546663.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
argona.ro - Port:
26 - Username:
dan.grama@argona.ro - Password:
Argona12!@ - Email To:
trainee@valleycountysar.org
Targets
-
-
Target
order6566546663.exe
-
Size
643KB
-
MD5
8a728a201ff4eebc956d8747c0b689e8
-
SHA1
94fe365f40c34e83e39a4c81c7cf9319d7cfa6cc
-
SHA256
0807202daf2095810fdbc78ccf60ed83368e84da1f89d7215f9bac6590b40b7d
-
SHA512
318b968f5ce9a3caf4a2664bcc6c355463ad78fb65c09cb054ac3fd00e65f7ea454bdb7b9577c6743a01c540eca57b6527708a9008926ae8c10737231ac8511b
-
SSDEEP
12288:ioEP/SJasDrhUVMJ5kjDZCwbX9PblDCkIcxWMB:A/4pDfGDYuRblDC7cxW
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-