General
-
Target
SSFAT08656900000.exe
-
Size
348KB
-
Sample
231002-svq3msdg34
-
MD5
7f4fdfffcbccb427dcdad0bdf96b0a17
-
SHA1
4111b148181f8d0a9d847f9ba0a6838b79e6f9b5
-
SHA256
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa
-
SHA512
8fba5cd6f9851e98320d8ecb3ba008c10135c5d4c63f89403b45775cbcd0484d708cd9bc086aef77319e58126a427a98842dbc4d4a9b1d21656dcc07c3b73023
-
SSDEEP
6144:vr9BIKD2SJMzodRpUZNFvzhwH5v/y+uwWRpZMc/b03KdeRV+9dk6ceh9X3P9:BfD2S+j5h0vRLGk6ceX
Static task
static1
Behavioral task
behavioral1
Sample
SSFAT08656900000.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SSFAT08656900000.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
posta.ni.net.tr - Port:
587 - Username:
[email protected] - Password:
nilya1957 - Email To:
[email protected]
Targets
-
-
Target
SSFAT08656900000.exe
-
Size
348KB
-
MD5
7f4fdfffcbccb427dcdad0bdf96b0a17
-
SHA1
4111b148181f8d0a9d847f9ba0a6838b79e6f9b5
-
SHA256
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa
-
SHA512
8fba5cd6f9851e98320d8ecb3ba008c10135c5d4c63f89403b45775cbcd0484d708cd9bc086aef77319e58126a427a98842dbc4d4a9b1d21656dcc07c3b73023
-
SSDEEP
6144:vr9BIKD2SJMzodRpUZNFvzhwH5v/y+uwWRpZMc/b03KdeRV+9dk6ceh9X3P9:BfD2S+j5h0vRLGk6ceX
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-