General
-
Target
Voyage Orders.exe
-
Size
738KB
-
Sample
230610-l3x3lafc91
-
MD5
64230ba43ee32c6ef45ef52e5e9827c8
-
SHA1
0a8ae546c3fcfb2165101b945a8ff67c906778d4
-
SHA256
ec8db8d90582b2c57d0dcf5670ed679c9008b435d0bd2cadca037c84d25df57a
-
SHA512
f1dade9fe791a85197af24dff90426eb101f1637a6f08c593804102c585bd8c2e606765f91b6ff9903c80248c3dc0d0961719cf28c611a52b9eeeb2bbc562cfe
-
SSDEEP
12288:5ZyvbhaDnLMzIL2q+RTdOL8+F8UjXfnfR+T2cH4mAGRn+zEEgNgiNFyc05+isz+2:cOyqGUL8+CUjXvfsqcH4mAGx+RgNBycX
Static task
static1
Behavioral task
behavioral1
Sample
Voyage Orders.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Voyage Orders.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
argona.ro - Port:
26 - Username:
dan.grama@argona.ro - Password:
Argona12!@ - Email To:
trainee@valleycountysar.org
Targets
-
-
Target
Voyage Orders.exe
-
Size
738KB
-
MD5
64230ba43ee32c6ef45ef52e5e9827c8
-
SHA1
0a8ae546c3fcfb2165101b945a8ff67c906778d4
-
SHA256
ec8db8d90582b2c57d0dcf5670ed679c9008b435d0bd2cadca037c84d25df57a
-
SHA512
f1dade9fe791a85197af24dff90426eb101f1637a6f08c593804102c585bd8c2e606765f91b6ff9903c80248c3dc0d0961719cf28c611a52b9eeeb2bbc562cfe
-
SSDEEP
12288:5ZyvbhaDnLMzIL2q+RTdOL8+F8UjXfnfR+T2cH4mAGRn+zEEgNgiNFyc05+isz+2:cOyqGUL8+CUjXvfsqcH4mAGx+RgNBycX
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-