General
-
Target
110223.exe
-
Size
349KB
-
Sample
231106-k8f6labg58
-
MD5
0f3e1e309ee9dae28670d40e495566c1
-
SHA1
869988a2a32e1d83425fcf4b9ccc946368ac4768
-
SHA256
0dc8b4659b84d8d9b96e544279da980b36301253912a043b5e48c9bd7bb6e09f
-
SHA512
e25017d98af6bd527d200fcc5b0077c33b6610cfecbff68312abba21b0e0ab3dea208dd37de73705ba3210bf76cc1fd4148c943e9a64bbc05b16b8a099ff6dd9
-
SSDEEP
6144:t7s78K51VhaZ0zc9in+ZExwHNnIjKlMstZvF9w8kZelBs27dU:i8mhaqzkcxW0KmsXtTgelBs27m
Static task
static1
Behavioral task
behavioral1
Sample
110223.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
110223.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.alualuminium.com.my - Port:
587 - Username:
[email protected] - Password:
U8G4S13#8Zk$ - Email To:
[email protected]
Targets
-
-
Target
110223.exe
-
Size
349KB
-
MD5
0f3e1e309ee9dae28670d40e495566c1
-
SHA1
869988a2a32e1d83425fcf4b9ccc946368ac4768
-
SHA256
0dc8b4659b84d8d9b96e544279da980b36301253912a043b5e48c9bd7bb6e09f
-
SHA512
e25017d98af6bd527d200fcc5b0077c33b6610cfecbff68312abba21b0e0ab3dea208dd37de73705ba3210bf76cc1fd4148c943e9a64bbc05b16b8a099ff6dd9
-
SSDEEP
6144:t7s78K51VhaZ0zc9in+ZExwHNnIjKlMstZvF9w8kZelBs27dU:i8mhaqzkcxW0KmsXtTgelBs27m
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-