General
-
Target
SALK0987654567890098.exe
-
Size
239KB
-
Sample
230602-k8fj3abb4y
-
MD5
7daba4afa9016748dbed9db96160a96b
-
SHA1
7990828d7073501e36f2dc4b5c0e0295bac4b0fa
-
SHA256
a762d43b5201af8296baa735ec7ac4870a9d27a17124be162c20524978e688f6
-
SHA512
e1a8549c1293526b901474c19f029f75f944d1ed570d8b3a074a0c3121c6f12c208606f7241e27cfd11fc461a8d17735808146344fd6f635259b6cff1662cae8
-
SSDEEP
6144:V9Ef3uo+J/pN9AjzUS8My5hFWYa2isJv0IpESnMuVy:V9Ef37UUkjuTSM+
Static task
static1
Behavioral task
behavioral1
Sample
SALK0987654567890098.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SALK0987654567890098.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
info@sienkakupeste.com - Password:
010203sienka++ - Email To:
saleseuropower1@yandex.com
Targets
-
-
Target
SALK0987654567890098.exe
-
Size
239KB
-
MD5
7daba4afa9016748dbed9db96160a96b
-
SHA1
7990828d7073501e36f2dc4b5c0e0295bac4b0fa
-
SHA256
a762d43b5201af8296baa735ec7ac4870a9d27a17124be162c20524978e688f6
-
SHA512
e1a8549c1293526b901474c19f029f75f944d1ed570d8b3a074a0c3121c6f12c208606f7241e27cfd11fc461a8d17735808146344fd6f635259b6cff1662cae8
-
SSDEEP
6144:V9Ef3uo+J/pN9AjzUS8My5hFWYa2isJv0IpESnMuVy:V9Ef37UUkjuTSM+
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-