General
-
Target
7fca74aa3d889f511284042cd24ae33e.bin
-
Size
495KB
-
Sample
230611-b1pckagc58
-
MD5
f7660098767764ad0b33eb494d5bd6c9
-
SHA1
cb64378c6ed3f22d761e348f92c9598fdb8f54d0
-
SHA256
6acc719309d3e660bebb4f2d165eb52dc4e946cefc6ec5ecc5a3fad9994c8dc9
-
SHA512
aa360817eada6e59ace603176486f50a41666889b7d45d0aab5d09af479f14842a014bc9d9e097646c4b70c777a45f2d2987d78de256d3fe3eb0b1230d8d2ca0
-
SSDEEP
12288:gzEVEBV8pUBmhikvGi4ZDNlVChTCBbVQee+G5i5Siaxlw3:gzEGgUBnkvGLZDNlVCV4VXe5Nlw3
Static task
static1
Behavioral task
behavioral1
Sample
P.O 3805.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
P.O 3805.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
Protocol: smtp- Host:
siamtmc.com - Port:
587 - Username:
[email protected] - Password:
s0mp0ng06
Extracted
snakekeylogger
Protocol: smtp- Host:
siamtmc.com - Port:
587 - Username:
[email protected] - Password:
s0mp0ng06 - Email To:
[email protected]
Targets
-
-
Target
P.O 3805.exe
-
Size
820KB
-
MD5
15acff30d0935be4d601433d66db1734
-
SHA1
3f115bfb24158a31b475b4fa314c8a7ec476ab32
-
SHA256
3aba02f8b1e468adf8164eb3932c56bf1082cad0f3c94a9b315e51ced8526669
-
SHA512
bea047c63a4cdf85eebfb80cda7fb6f028f489053d4b2ad5ad88f7bc75d11641a9c454469d4f0b61a056ef3ad229e0a87b3a55d5d68fbc0706ddd68d076a9f4e
-
SSDEEP
6144:kECzU9V2fTa7sH/T1pJthdc31GlS/oZ/6fZUcHpVDDMhn6TFh/Dn3R4EVm8LMGsW:/aI31GeueJDMMFhjRxMGrd2UswtN3a
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-