General
-
Target
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081_JC.exe
-
Size
543KB
-
Sample
230926-s61ffsba51
-
MD5
5dbd5cee5eedd8dc875b970739681add
-
SHA1
8d89b74390d68afaf6a3f7008d1573d7e85db73c
-
SHA256
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081
-
SHA512
8830e0e1b64fd3e7308541ab82bbd741f896089749ad8800dd562485210d4cd0b46d43b0d9ea40320adf9b3ab68d5dd130d38da7c53ea09551a2e49d41695def
-
SSDEEP
12288:ZVj3hLQvfdxOo7gpXtrwNF725sE5pLkIeeoIIBwiWWPXDWmRqlBBYvNG/:6NMWDeVI0I+rKvU
Static task
static1
Behavioral task
behavioral1
Sample
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ozakaluminyum.com - Port:
587 - Username:
[email protected] - Password:
ETKghx*c3KoQ
Targets
-
-
Target
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081_JC.exe
-
Size
543KB
-
MD5
5dbd5cee5eedd8dc875b970739681add
-
SHA1
8d89b74390d68afaf6a3f7008d1573d7e85db73c
-
SHA256
a3ba5851c9d979b726e0c0e28e3dc4e7fb896b9198c592af71791c20a6c8d081
-
SHA512
8830e0e1b64fd3e7308541ab82bbd741f896089749ad8800dd562485210d4cd0b46d43b0d9ea40320adf9b3ab68d5dd130d38da7c53ea09551a2e49d41695def
-
SSDEEP
12288:ZVj3hLQvfdxOo7gpXtrwNF725sE5pLkIeeoIIBwiWWPXDWmRqlBBYvNG/:6NMWDeVI0I+rKvU
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-