General
-
Target
NEAS.NEAS314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82exeexe_JC.exe
-
Size
580KB
-
Sample
231021-wtbhcagd8z
-
MD5
77175495f7c07290890b5005225c074d
-
SHA1
dcc345a4ba956e493eeda89a087f4e3ae50dc7b8
-
SHA256
314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82
-
SHA512
703277b24b59a1742f5d9d2fcd6beccf155aa4adc04d3a2405a40792576dfb53cd01ec96818b081418619768cf4701c4d651a647a8ca018988ff10883c1c3709
-
SSDEEP
12288:nb5yzvbYmBH0eAM7EasmTtEGb/cd+2oYCYCclYa7mPGyHa2:FebY09AMRsOERnoTYzlYa7Ua
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAS314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82exeexe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.NEAS314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82exeexe_JC.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.defalife.com.tr - Port:
587 - Username:
[email protected] - Password:
Defalife124578
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.defalife.com.tr - Port:
587 - Username:
[email protected] - Password:
Defalife124578
Targets
-
-
Target
NEAS.NEAS314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82exeexe_JC.exe
-
Size
580KB
-
MD5
77175495f7c07290890b5005225c074d
-
SHA1
dcc345a4ba956e493eeda89a087f4e3ae50dc7b8
-
SHA256
314f5681178079a783379f4b04ab87b33e8ea82edee4707886a977bd19cd8b82
-
SHA512
703277b24b59a1742f5d9d2fcd6beccf155aa4adc04d3a2405a40792576dfb53cd01ec96818b081418619768cf4701c4d651a647a8ca018988ff10883c1c3709
-
SSDEEP
12288:nb5yzvbYmBH0eAM7EasmTtEGb/cd+2oYCYCclYa7mPGyHa2:FebY09AMRsOERnoTYzlYa7Ua
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-