General
-
Target
PO ORDER-2311-0145.exe
-
Size
367KB
-
Sample
231113-hd24gaah2w
-
MD5
4557b75c3f8dfc2a31ff0e8e56792653
-
SHA1
d348497a1ae8614d46a8ba43b18bb2c7f46d7fbb
-
SHA256
dfd104aa405fc9d466c75c97ea643a608b2faabc6a8234417126ca1ab05d0140
-
SHA512
4cc0742447325f33b35ec61cb572b88ec6eaa35ce2bf36f1fa7f9a69f25da6992c50363169100413e2a72b5289445ddc5628d5abb9f1f6ac077825a275e5622a
-
SSDEEP
6144:yAY8QgjLbG3BjVEOFOtw5e3mJG8kJeAfMJgwCRM8Xaqegmc8KCx74L:Bs3wy5e3hWJgw8M8X0xc8KykL
Static task
static1
Behavioral task
behavioral1
Sample
PO ORDER-2311-0145.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PO ORDER-2311-0145.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
PO ORDER-2311-0145.exe
-
Size
367KB
-
MD5
4557b75c3f8dfc2a31ff0e8e56792653
-
SHA1
d348497a1ae8614d46a8ba43b18bb2c7f46d7fbb
-
SHA256
dfd104aa405fc9d466c75c97ea643a608b2faabc6a8234417126ca1ab05d0140
-
SHA512
4cc0742447325f33b35ec61cb572b88ec6eaa35ce2bf36f1fa7f9a69f25da6992c50363169100413e2a72b5289445ddc5628d5abb9f1f6ac077825a275e5622a
-
SSDEEP
6144:yAY8QgjLbG3BjVEOFOtw5e3mJG8kJeAfMJgwCRM8Xaqegmc8KCx74L:Bs3wy5e3hWJgw8M8X0xc8KykL
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-