General
-
Target
file.exe
-
Size
327KB
-
Sample
231026-k6q8saeh86
-
MD5
b32777ec3e6822e6de38fd54a813f179
-
SHA1
dcf73ce955dbbbc34b132d7c224c871266daf4fd
-
SHA256
1700e539cd41c00e4b3b8b4405ee0bf338192f0b24836939e14f8b9d2c6bd9f4
-
SHA512
d8069e88cd701bde4bc623d8466f8eea46d6e5c17ab9c91472219de4e33f7d52c531050dca659a25fc7a448a7fa8b19a5240a9b27ab03d1db75c9eec282c4dab
-
SSDEEP
6144:CeOazRkjEMgrtPJhz9HLAuTQfc/VsKQqeYOtYYE2Odtyqd72f6QD:CeOazsIPD9Au5qWZlYrOiqod
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hahcd.com - Port:
587 - Username:
[email protected] - Password:
d5ClGOqbU6HU
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.hahcd.com - Port:
587 - Username:
[email protected] - Password:
d5ClGOqbU6HU - Email To:
[email protected]
Targets
-
-
Target
file.exe
-
Size
327KB
-
MD5
b32777ec3e6822e6de38fd54a813f179
-
SHA1
dcf73ce955dbbbc34b132d7c224c871266daf4fd
-
SHA256
1700e539cd41c00e4b3b8b4405ee0bf338192f0b24836939e14f8b9d2c6bd9f4
-
SHA512
d8069e88cd701bde4bc623d8466f8eea46d6e5c17ab9c91472219de4e33f7d52c531050dca659a25fc7a448a7fa8b19a5240a9b27ab03d1db75c9eec282c4dab
-
SSDEEP
6144:CeOazRkjEMgrtPJhz9HLAuTQfc/VsKQqeYOtYYE2Odtyqd72f6QD:CeOazsIPD9Au5qWZlYrOiqod
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-