General
-
Target
ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe.zip
-
Size
320KB
-
Sample
231002-n1r5nsbg48
-
MD5
187f66b47fef7c368900bd38e497768f
-
SHA1
4caa1116242532d12d7763bbb05edf0355ff4691
-
SHA256
95d3d4b51a244e544f09faaeb3dd8654bd568238ecba7f4198013064c2e01a82
-
SHA512
0bb4a47f3a349d47a38ba04853e6cdbf738853fcf064710ada19b592a8d8f77d6780925e6b52b3401333d7c3cbc2b7e155fdcdfeb8293225c445b74377a18e56
-
SSDEEP
6144:Nwqbgj8i3KOEfH2MBLor73vCIt/16XJcW8TNccbYbJpTtjfyZDzdBpn:yqbvi3JEf2MBLe7ltcZMTe9p8ZHjpn
Static task
static1
Behavioral task
behavioral1
Sample
ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.product-secured.com - Port:
21 - Username:
[email protected] - Password:
575K5(MaZro2575K5(MaZro2
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.product-secured.com/ - Port:
21 - Username:
[email protected] - Password:
575K5(MaZro2575K5(MaZro2
Targets
-
-
Target
ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe
-
Size
682KB
-
MD5
31c0fb555469b0836b447b2e71c8fd74
-
SHA1
85a52ac681c856927403114207455b1cc42d38a0
-
SHA256
ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286
-
SHA512
7d549ef196dbb3701c4c4b83ef6a7b7e455ebc45d00037e399f5cf44a3909bd12ca21aee5bc07dbd96a5df2a50b39004e342840e2527349eba9cbb5e6f08d473
-
SSDEEP
12288:361tZZr9L7kX0F1CEgkEXQwko3b2VvRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRs:361tZL3kY0EgnXQOL
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-