General
-
Target
NEAS.NEASNEAS008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbfexeexeexe_JC.exe
-
Size
539KB
-
Sample
231013-tgtgaadd63
-
MD5
b1a8dfff51ee717d53c7f90f0840fe9b
-
SHA1
33ca9d90da7c348233e4eaa565c5b9b91017709d
-
SHA256
008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbf
-
SHA512
fbf81cba922f55946d5fc7f7694a9095cef51976eb7780b851f1c2fd34b7a366da7f527f73343b455f15e5d5f9a37cc4b1c2dfab0f43cd72960dfc39feab90e6
-
SSDEEP
12288:mdJF9KCvoctGgxTkn3MvWroS5RtS0yUn1vhU2Zq6s9sdX:mdJF4CvoctGITknAWZ1ULtGX
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEAS008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbfexeexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASNEAS008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbfexeexeexe_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.megakarsa.com - Port:
587 - Username:
[email protected] - Password:
f1n4nc3m3g4k4Rs4 - Email To:
[email protected]
Targets
-
-
Target
NEAS.NEASNEAS008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbfexeexeexe_JC.exe
-
Size
539KB
-
MD5
b1a8dfff51ee717d53c7f90f0840fe9b
-
SHA1
33ca9d90da7c348233e4eaa565c5b9b91017709d
-
SHA256
008af3e6e04d2340b385793e03af2550e0e18ce1531d635dff30e69d3e820dbf
-
SHA512
fbf81cba922f55946d5fc7f7694a9095cef51976eb7780b851f1c2fd34b7a366da7f527f73343b455f15e5d5f9a37cc4b1c2dfab0f43cd72960dfc39feab90e6
-
SSDEEP
12288:mdJF9KCvoctGgxTkn3MvWroS5RtS0yUn1vhU2Zq6s9sdX:mdJF4CvoctGITknAWZ1ULtGX
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-