General
-
Target
Purchase Order.exe
-
Size
367KB
-
Sample
231108-jmjh6ahc38
-
MD5
e9d5ee7c8be48ac6eebf50e1f7f5f861
-
SHA1
b217a9d47c3a62fe3ac52a149abb4e302e664bae
-
SHA256
1b14242fe34c166e7842a1c108c69fcce2d31484cc93ed803f1b28b46a0baeea
-
SHA512
2048ccf72dbe507c5f1b88d3edb3c64b27a05a40f67eb28a0bec16f2aaa5f62602303cd8c1e77f195ffc54806a65e0d118722418cd98747c365a7077bc5be0bd
-
SSDEEP
6144:yAY8QgjLaR06ziRI5HiZB/rPf+ywWlTJYJzp4Xkj8jKOexbYl41mOds8wJdbrrhh:BaR06ziRI5HgdrX5nlTJoz2XkMKOexbc
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
Purchase Order.exe
-
Size
367KB
-
MD5
e9d5ee7c8be48ac6eebf50e1f7f5f861
-
SHA1
b217a9d47c3a62fe3ac52a149abb4e302e664bae
-
SHA256
1b14242fe34c166e7842a1c108c69fcce2d31484cc93ed803f1b28b46a0baeea
-
SHA512
2048ccf72dbe507c5f1b88d3edb3c64b27a05a40f67eb28a0bec16f2aaa5f62602303cd8c1e77f195ffc54806a65e0d118722418cd98747c365a7077bc5be0bd
-
SSDEEP
6144:yAY8QgjLaR06ziRI5HiZB/rPf+ywWlTJYJzp4Xkj8jKOexbYl41mOds8wJdbrrhh:BaR06ziRI5HgdrX5nlTJoz2XkMKOexbc
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-