General
-
Target
s2b098765456.exe
-
Size
223KB
-
Sample
230610-l3xrtsfc9z
-
MD5
4c257a8f201861fc89babf5b60f30c24
-
SHA1
bd3e902c71e2993522324194711827515b889871
-
SHA256
47fc03f67fe9678fcc2a68bfd2fe0d75dec153ba66f84088395020b28cc7307f
-
SHA512
78836e6c4aeada6607f722ef6db71ec2e9c152c2774c676cd83789e71716147c41f4547fee9a818dd48aeb83c4c9a7684e91ed296582ee0166cc1b1bda823f5e
-
SSDEEP
6144:fmN3WNHnldWjuhCKseMMNeyzzOe+Y9LiEJv0RS9Vy:fmN3cHnldWjuhCKseMMNey3P+AXuQb
Static task
static1
Behavioral task
behavioral1
Sample
s2b098765456.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
s2b098765456.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
info@sienkakupeste.com - Password:
010203sienka++ - Email To:
saleseuropower2@yandex.com
Targets
-
-
Target
s2b098765456.exe
-
Size
223KB
-
MD5
4c257a8f201861fc89babf5b60f30c24
-
SHA1
bd3e902c71e2993522324194711827515b889871
-
SHA256
47fc03f67fe9678fcc2a68bfd2fe0d75dec153ba66f84088395020b28cc7307f
-
SHA512
78836e6c4aeada6607f722ef6db71ec2e9c152c2774c676cd83789e71716147c41f4547fee9a818dd48aeb83c4c9a7684e91ed296582ee0166cc1b1bda823f5e
-
SSDEEP
6144:fmN3WNHnldWjuhCKseMMNeyzzOe+Y9LiEJv0RS9Vy:fmN3cHnldWjuhCKseMMNey3P+AXuQb
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-