General
-
Target
NEAS.b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea.exe
-
Size
367KB
-
Sample
231114-jtk1kahb9y
-
MD5
1e6ef4467d814dc8ef08e1ba7bf679d8
-
SHA1
f68db8dafc9af7777f879f3f6e64ea598b750fb9
-
SHA256
b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea
-
SHA512
2355aa0fd4c1e3fc2f3f11592e9ee58f893e4acfd8205d5542fa5da5c79bd4e9b70e261828a8210bfd972117d4c9200fdab5cbb6e1730f1abae24c94e6067ad5
-
SSDEEP
6144:yAY8QgjL2G3BjVEOFOFAbApunj+whXQ8kSU7h9NBoRM8Xaqegmc8KCx74L:B73wFAbApCj+cESM0M8X0xc8KykL
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
NEAS.b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea.exe
-
Size
367KB
-
MD5
1e6ef4467d814dc8ef08e1ba7bf679d8
-
SHA1
f68db8dafc9af7777f879f3f6e64ea598b750fb9
-
SHA256
b0b23fc04103747a567f6233dfaee3bc9405ec84550ace32acfcd66a57d104ea
-
SHA512
2355aa0fd4c1e3fc2f3f11592e9ee58f893e4acfd8205d5542fa5da5c79bd4e9b70e261828a8210bfd972117d4c9200fdab5cbb6e1730f1abae24c94e6067ad5
-
SSDEEP
6144:yAY8QgjL2G3BjVEOFOFAbApunj+whXQ8kSU7h9NBoRM8Xaqegmc8KCx74L:B73wFAbApCj+cESM0M8X0xc8KykL
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-