General
-
Target
0fecd9ac3acb126653242cdab84ca7777b212b701a2c91f3a43077fce446142f
-
Size
296KB
-
Sample
231108-c8wmaacd5w
-
MD5
27a1a6f2d9da5acefbb9329130c7b22c
-
SHA1
0f788059c8c76fe4db2b307f9a93faa01517b9c9
-
SHA256
0fecd9ac3acb126653242cdab84ca7777b212b701a2c91f3a43077fce446142f
-
SHA512
bbd9d4a06cb9cdd09646a0e816a7e87409da60cd5e44c45ebeef01cdd6e9ed908538f248c9311712e1815f18aad08bb24449f3b7eb8833af1b84fc9fd4323bac
-
SSDEEP
6144:Qly2y7NxcYckItvECGjlu6xsB30IxI6xeEjBlEdVKN4yyBcOc7:Qly/hxbckI9wJhqV0v6xeEllEdVu4y77
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
Purchase Order.exe
-
Size
367KB
-
MD5
e9d5ee7c8be48ac6eebf50e1f7f5f861
-
SHA1
b217a9d47c3a62fe3ac52a149abb4e302e664bae
-
SHA256
1b14242fe34c166e7842a1c108c69fcce2d31484cc93ed803f1b28b46a0baeea
-
SHA512
2048ccf72dbe507c5f1b88d3edb3c64b27a05a40f67eb28a0bec16f2aaa5f62602303cd8c1e77f195ffc54806a65e0d118722418cd98747c365a7077bc5be0bd
-
SSDEEP
6144:yAY8QgjLaR06ziRI5HiZB/rPf+ywWlTJYJzp4Xkj8jKOexbYl41mOds8wJdbrrhh:BaR06ziRI5HgdrX5nlTJoz2XkMKOexbc
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-