General
-
Target
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124_JC.exe
-
Size
1.0MB
-
Sample
231012-a6hxaseb51
-
MD5
54e6b3143669461f4df675f32705f602
-
SHA1
779e635d839eecb38aa17b5a89ae7a5549bc7d79
-
SHA256
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124
-
SHA512
da327e65a84f0e2c4e19006bf0492d555a4b96d657c8c93e7842ebd6de9d96a47529e9cfd951425ca18543dde7d91e112b7700f978586e438894f05826e1f07f
-
SSDEEP
12288:sQHCr/cT5J2iNtxIQ/tjwUj4m3r+hQClaHFe8MpZkD8qaCFHi4gIrDRjmfTf4SNv:y41F3904CuFe8MpCwcF6Tp
Static task
static1
Behavioral task
behavioral1
Sample
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.realirtlscm.com - Port:
587 - Username:
[email protected] - Password:
password2023 - Email To:
[email protected]
Targets
-
-
Target
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124_JC.exe
-
Size
1.0MB
-
MD5
54e6b3143669461f4df675f32705f602
-
SHA1
779e635d839eecb38aa17b5a89ae7a5549bc7d79
-
SHA256
7bfacddb1871cc1aab46c0274e8e8f2cfc2cbb4b7caef9df24b6933a1ff75124
-
SHA512
da327e65a84f0e2c4e19006bf0492d555a4b96d657c8c93e7842ebd6de9d96a47529e9cfd951425ca18543dde7d91e112b7700f978586e438894f05826e1f07f
-
SSDEEP
12288:sQHCr/cT5J2iNtxIQ/tjwUj4m3r+hQClaHFe8MpZkD8qaCFHi4gIrDRjmfTf4SNv:y41F3904CuFe8MpCwcF6Tp
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-