General
-
Target
89c1879930e5b0c39baa5932ec3d829d.exe
-
Size
399KB
-
Sample
231018-tehl1afh2y
-
MD5
89c1879930e5b0c39baa5932ec3d829d
-
SHA1
9ea5c83f635e1cc35c4dc3b5a7d4974bba379076
-
SHA256
32996e18720ed05ffe33a6e787680c248b05c9bdda265d9970043de9348bd248
-
SHA512
1812015a6e11ada3425936b39f6f55d8f0949b779514f1dd8db655a4b285a35a45ddcb99b4df5ab1470fe2778a5793e9ec714b647d1ebbdedcd6c35349049844
-
SSDEEP
6144:Vij45DzBIKD2SJMzodRpUZNFvzqsG3OHDWLNFwNYdk6ceh9X3P9u4oWNl:ZfD2S+j5VBSLNuQk6ceX5ll
Static task
static1
Behavioral task
behavioral1
Sample
89c1879930e5b0c39baa5932ec3d829d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
89c1879930e5b0c39baa5932ec3d829d.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.watchparts2u.com.au - Port:
587 - Username:
[email protected] - Password:
pepSIjZk5qWU
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.watchparts2u.com.au - Port:
587 - Username:
[email protected] - Password:
pepSIjZk5qWU - Email To:
[email protected]
Targets
-
-
Target
89c1879930e5b0c39baa5932ec3d829d.exe
-
Size
399KB
-
MD5
89c1879930e5b0c39baa5932ec3d829d
-
SHA1
9ea5c83f635e1cc35c4dc3b5a7d4974bba379076
-
SHA256
32996e18720ed05ffe33a6e787680c248b05c9bdda265d9970043de9348bd248
-
SHA512
1812015a6e11ada3425936b39f6f55d8f0949b779514f1dd8db655a4b285a35a45ddcb99b4df5ab1470fe2778a5793e9ec714b647d1ebbdedcd6c35349049844
-
SSDEEP
6144:Vij45DzBIKD2SJMzodRpUZNFvzqsG3OHDWLNFwNYdk6ceh9X3P9u4oWNl:ZfD2S+j5VBSLNuQk6ceX5ll
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-