General
-
Target
Fatura n. 24.exe
-
Size
602KB
-
Sample
230714-hfreradc61
-
MD5
764fe6da2d63d33c57105a7f193de2fe
-
SHA1
c434951ca63e276b09aa1898575144b3f449939d
-
SHA256
221d2dd6e3f557fc5706b3fc70b7412993265406831e7816d0732cd3087c023d
-
SHA512
05ff5a4a10db9e4885b18053bf263833bbceceffe3da6697b3805e1a51eda6dea8b8744fd5ef5b4d89c2d527ec0a304f3a89e09906f8a56814aacc6aa3ce7c2f
-
SSDEEP
12288:IDp8J0xn/G06CmodxPBJNdUMIP3BxUrDhH6wS4ASI3nevf:lJ0xeUZPNWbUrNH84rff
Static task
static1
Behavioral task
behavioral1
Sample
Fatura n. 24.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Fatura n. 24.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.mutuadebasto.pt - Port:
587 - Username:
[email protected] - Password:
mutua_Fernando123
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.mutuadebasto.pt - Port:
587 - Username:
[email protected] - Password:
mutua_Fernando123 - Email To:
[email protected]
Targets
-
-
Target
Fatura n. 24.exe
-
Size
602KB
-
MD5
764fe6da2d63d33c57105a7f193de2fe
-
SHA1
c434951ca63e276b09aa1898575144b3f449939d
-
SHA256
221d2dd6e3f557fc5706b3fc70b7412993265406831e7816d0732cd3087c023d
-
SHA512
05ff5a4a10db9e4885b18053bf263833bbceceffe3da6697b3805e1a51eda6dea8b8744fd5ef5b4d89c2d527ec0a304f3a89e09906f8a56814aacc6aa3ce7c2f
-
SSDEEP
12288:IDp8J0xn/G06CmodxPBJNdUMIP3BxUrDhH6wS4ASI3nevf:lJ0xeUZPNWbUrNH84rff
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-