General
-
Target
roforma_Invoice_0009300_74885959969_9876.exe
-
Size
693KB
-
Sample
230609-t5ye5sde6s
-
MD5
9279aec14e5b8d0e456476b4a3fe2f69
-
SHA1
8042e1524a4a0cd790f48328aa7f52d24e766a73
-
SHA256
612f1a7e7ced6e8e9a9d9eff56da53c08c27c911068fc34d323fb4f05b895f91
-
SHA512
8c812ac14bcb31c15f44375aea59e67beb95ac51048ef9f55bee64806ebd864faacef0fb33afec341b55291c645b943abb2e1a5e822a744993fb83620b2315b7
-
SSDEEP
12288:FcPPWR28Le0cY+Yg9fb9Ku8Qz9bCRSKpH119GLRJtejQlP8B8d5LO:FcX+xL9Rk9iQz9bGSIHBGtJ0QlP8O5y
Static task
static1
Behavioral task
behavioral1
Sample
roforma_Invoice_0009300_74885959969_9876.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
roforma_Invoice_0009300_74885959969_9876.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
silverkeyinternational.com - Port:
26 - Username:
rafia@silverkeyinternational.com - Password:
Key@2020
Targets
-
-
Target
roforma_Invoice_0009300_74885959969_9876.exe
-
Size
693KB
-
MD5
9279aec14e5b8d0e456476b4a3fe2f69
-
SHA1
8042e1524a4a0cd790f48328aa7f52d24e766a73
-
SHA256
612f1a7e7ced6e8e9a9d9eff56da53c08c27c911068fc34d323fb4f05b895f91
-
SHA512
8c812ac14bcb31c15f44375aea59e67beb95ac51048ef9f55bee64806ebd864faacef0fb33afec341b55291c645b943abb2e1a5e822a744993fb83620b2315b7
-
SSDEEP
12288:FcPPWR28Le0cY+Yg9fb9Ku8Qz9bCRSKpH119GLRJtejQlP8B8d5LO:FcX+xL9Rk9iQz9bGSIHBGtJ0QlP8O5y
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-