General
-
Target
ekstre.exe
-
Size
628KB
-
Sample
231113-t4ss9sdh5z
-
MD5
7eec1e611d996a5f2792c9778da882bc
-
SHA1
90b7ad77edd7e61499d8e0160490bce4c9366934
-
SHA256
1d7069432d20883d8bf613e91d3a78de608bb7e7fa2b6daf1252e5da9a717ba2
-
SHA512
3bcb54831392b6b6c0c976f4c9940590e0095d14859d02a639a0908ef131039d323f5601a142196c47e6d43f473f3fd8999b47c79f247380660e1eb413b91bea
-
SSDEEP
12288:QWOTNXc3hEunBAFnSuBVZ60SwMPAF98gb8X+SHucpVHGH:332uBqSu9FHMPAF76+SLVHG
Static task
static1
Behavioral task
behavioral1
Sample
ekstre.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ekstre.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.alupanorama.com.my - Port:
587 - Username:
[email protected] - Password:
t9&KsFB5dPgV - Email To:
[email protected]
Targets
-
-
Target
ekstre.exe
-
Size
628KB
-
MD5
7eec1e611d996a5f2792c9778da882bc
-
SHA1
90b7ad77edd7e61499d8e0160490bce4c9366934
-
SHA256
1d7069432d20883d8bf613e91d3a78de608bb7e7fa2b6daf1252e5da9a717ba2
-
SHA512
3bcb54831392b6b6c0c976f4c9940590e0095d14859d02a639a0908ef131039d323f5601a142196c47e6d43f473f3fd8999b47c79f247380660e1eb413b91bea
-
SSDEEP
12288:QWOTNXc3hEunBAFnSuBVZ60SwMPAF98gb8X+SHucpVHGH:332uBqSu9FHMPAF76+SLVHG
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-