General
-
Target
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
-
Size
320KB
-
Sample
231011-r7k7gsga52
-
MD5
ee3ba73a32711562903523726ba2df7c
-
SHA1
aa3927a92d75cae9b60740ac656a7944709d139b
-
SHA256
eeef52701956cc860771ef368589e3590a1e55a172910fb7b02950a5f9a06a9e
-
SHA512
2fda0a7b8f35d73a209b796c1bb68f0437e2d066dbaa7bcab24ced914250a7ef3e15b67ed88a1b62714d5d9d5ec2f7f2ac593bb3c849f22bb75872b317183943
-
SSDEEP
6144:krguHQQbURQH4SAislYsk1uU9pqZ+MiHk+xujrKO7I:krguH/URQYSAisl1klu1+8XKC
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
posta.ni.net.tr - Port:
587 - Username:
[email protected] - Password:
nilya1957 - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Win32.MalwareX-gen.16056.29351.exe
-
Size
320KB
-
MD5
ee3ba73a32711562903523726ba2df7c
-
SHA1
aa3927a92d75cae9b60740ac656a7944709d139b
-
SHA256
eeef52701956cc860771ef368589e3590a1e55a172910fb7b02950a5f9a06a9e
-
SHA512
2fda0a7b8f35d73a209b796c1bb68f0437e2d066dbaa7bcab24ced914250a7ef3e15b67ed88a1b62714d5d9d5ec2f7f2ac593bb3c849f22bb75872b317183943
-
SSDEEP
6144:krguHQQbURQH4SAislYsk1uU9pqZ+MiHk+xujrKO7I:krguH/URQYSAisl1klu1+8XKC
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-