General
-
Target
42e3d6016d145ae5bd157bd7dbd86963.exe
-
Size
623KB
-
Sample
230826-j6dr1sag4y
-
MD5
42e3d6016d145ae5bd157bd7dbd86963
-
SHA1
3728f467ff8026872de04f3ccef78a2d4a47df69
-
SHA256
48edab5efefe889cc80214488317960772b2482e86a96e1ceac109287926179e
-
SHA512
6a0bf2673c105de4a69824de63a5a187ff9ce4eb8ab008fe33ddc9a2f3188fcd0ce063a3a8e599f6a3ba8a3f541b88ca0ef57ad57aa95d388fbe1faf1fb3bfdb
-
SSDEEP
12288:3Vp0K8s6owoQCOahAbQ5hq+JJ8psQA5Uo6Bp83pazn7N3f0SHOy:3Vp0K8s6oworOahAIVJ8SQqUo6Ba3paV
Static task
static1
Behavioral task
behavioral1
Sample
42e3d6016d145ae5bd157bd7dbd86963.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42e3d6016d145ae5bd157bd7dbd86963.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.qbangra.com - Port:
587 - Username:
[email protected] - Password:
QBangra2020 - Email To:
[email protected]
Targets
-
-
Target
42e3d6016d145ae5bd157bd7dbd86963.exe
-
Size
623KB
-
MD5
42e3d6016d145ae5bd157bd7dbd86963
-
SHA1
3728f467ff8026872de04f3ccef78a2d4a47df69
-
SHA256
48edab5efefe889cc80214488317960772b2482e86a96e1ceac109287926179e
-
SHA512
6a0bf2673c105de4a69824de63a5a187ff9ce4eb8ab008fe33ddc9a2f3188fcd0ce063a3a8e599f6a3ba8a3f541b88ca0ef57ad57aa95d388fbe1faf1fb3bfdb
-
SSDEEP
12288:3Vp0K8s6owoQCOahAbQ5hq+JJ8psQA5Uo6Bp83pazn7N3f0SHOy:3Vp0K8s6oworOahAIVJ8SQqUo6Ba3paV
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-