General
-
Target
DHL AWB 378008600.exe
-
Size
610KB
-
Sample
230712-gr18nada81
-
MD5
fe0c8f270ac2941a15d21f1c4f74adca
-
SHA1
a443fe82b2c148ba23606b9753e6d06655de8306
-
SHA256
e0efdd6252609b1039db00c31d375781a03b956a4ba65d8a11b5b81ce46a30d8
-
SHA512
56286e2c78307b8a8efbc6e28c3b6790a5a672589cf9678a3b22b3c2feaa8cc00b35eb68eb6d54f0c242aab92114458f4f05d2ffa98c24befaf37cbb9143a14b
-
SSDEEP
12288:UN1koqRbbjLp/VkW5kktp1onqtTy5RGNHDPR:lj1Zp1CeH7
Static task
static1
Behavioral task
behavioral1
Sample
DHL AWB 378008600.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
DHL AWB 378008600.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ratoolapparels.com - Port:
587 - Username:
[email protected] - Password:
LtD//20+4) - Email To:
[email protected]
Targets
-
-
Target
DHL AWB 378008600.exe
-
Size
610KB
-
MD5
fe0c8f270ac2941a15d21f1c4f74adca
-
SHA1
a443fe82b2c148ba23606b9753e6d06655de8306
-
SHA256
e0efdd6252609b1039db00c31d375781a03b956a4ba65d8a11b5b81ce46a30d8
-
SHA512
56286e2c78307b8a8efbc6e28c3b6790a5a672589cf9678a3b22b3c2feaa8cc00b35eb68eb6d54f0c242aab92114458f4f05d2ffa98c24befaf37cbb9143a14b
-
SSDEEP
12288:UN1koqRbbjLp/VkW5kktp1onqtTy5RGNHDPR:lj1Zp1CeH7
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-