General
-
Target
contract.exe
-
Size
570KB
-
Sample
231205-h4ee4ahg2x
-
MD5
3c448192bfb521f123506e0a385eb6da
-
SHA1
04de893d8e6adf340bae48b7b829398725a98208
-
SHA256
db10e4331d6379d0f7c17f8c000b43a399621745526f1286f85ff3361d5299b9
-
SHA512
b419879d15d50ac97c9b6f2fb7575a948815ca52fbff41bfd80a751d3d1500fddd009ea25c9f55e1c1843e4b32ae1ba5878de447cd40619dd2441439c81eccb0
-
SSDEEP
12288:M397phPSx6aQH5nJUhUQ7uWZkceauwUeZeKBPNY4URAQmbCp:M39dlSgTKSQ7u+NrhUWeKBy
Static task
static1
Behavioral task
behavioral1
Sample
contract.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
contract.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.mct2.co.za - Port:
587 - Username:
[email protected] - Password:
00000
Targets
-
-
Target
contract.exe
-
Size
570KB
-
MD5
3c448192bfb521f123506e0a385eb6da
-
SHA1
04de893d8e6adf340bae48b7b829398725a98208
-
SHA256
db10e4331d6379d0f7c17f8c000b43a399621745526f1286f85ff3361d5299b9
-
SHA512
b419879d15d50ac97c9b6f2fb7575a948815ca52fbff41bfd80a751d3d1500fddd009ea25c9f55e1c1843e4b32ae1ba5878de447cd40619dd2441439c81eccb0
-
SSDEEP
12288:M397phPSx6aQH5nJUhUQ7uWZkceauwUeZeKBPNY4URAQmbCp:M39dlSgTKSQ7u+NrhUWeKBy
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-