General
-
Target
1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.zip
-
Size
542KB
-
Sample
231119-z2vsqsbf26
-
MD5
f8f9711eb260ee174cf2d8ee2833052a
-
SHA1
a4f6d4667334f63562c0494902fdedc6ab1a75c8
-
SHA256
bca369ab3c26d9fee70f3ff85e13135934e96a866bb8d4564bc3d3017ba7ddcf
-
SHA512
3c232152c83c00e3e88733d8004e488c20e85d4409b2d5f9e5f916f114f3af720451562f97f0a4e3e8f193695c6e4c68f59738b0f7ddd5b1ecfa80e3f5e164e8
-
SSDEEP
12288:8oRUW0i8rHgwgBPkBYc2NajZSzjZy4VzAB/GY6JeYh4JoDTod+amVSGrB5HPZv:8o5yD9g6CnNISZyeAJGYYeYhxod+fVS6
Static task
static1
Behavioral task
behavioral1
Sample
1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.exe
-
Size
616KB
-
MD5
77521173381682b5a1deb286bce27bf4
-
SHA1
2ad56680cb0c821b18c269c63f4eeeb770140800
-
SHA256
1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6
-
SHA512
5366df45795f970f1b17113caf65c1e677b44da372cc85159fc4de4d8d32a08798aa4120cac956014c75fb71fce53ddfe8e76075b66c5f24e50a8f4a12254e53
-
SSDEEP
12288:h36N/bxyuAFnSz0cYMSE7a45naENKqIfPbY9QPNTURftb2pLuxQ:h3gqSznYMP5MbskYVapuQ
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-