General
-
Target
specifications.exe
-
Size
489KB
-
Sample
231219-sj14gabdel
-
MD5
ea62d408154d458d4f304c463bb54020
-
SHA1
72952a0d8ddcf5ea36bd0b8eeb613fbd0b2f6de4
-
SHA256
ef8385d4683a68a5ce64ba33ddb89cf73848d082047ff886b61b53a042a72cc1
-
SHA512
5b89ac053b13c0c96d74c69c402b211cd4b71ca8f6103666cfbaf6dc76b795f69e608a1ff527abf39bb6ed2b7a120a0d7048dc0e645c25751dfca0f779c45a48
-
SSDEEP
12288:yrpviYJS8Eg+54Y0YI7LPyig/jZbMbYWZ:yrpasS81+54YavPyigLaT
Static task
static1
Behavioral task
behavioral1
Sample
specifications.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
specifications.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
specifications.exe
-
Size
489KB
-
MD5
ea62d408154d458d4f304c463bb54020
-
SHA1
72952a0d8ddcf5ea36bd0b8eeb613fbd0b2f6de4
-
SHA256
ef8385d4683a68a5ce64ba33ddb89cf73848d082047ff886b61b53a042a72cc1
-
SHA512
5b89ac053b13c0c96d74c69c402b211cd4b71ca8f6103666cfbaf6dc76b795f69e608a1ff527abf39bb6ed2b7a120a0d7048dc0e645c25751dfca0f779c45a48
-
SSDEEP
12288:yrpviYJS8Eg+54Y0YI7LPyig/jZbMbYWZ:yrpasS81+54YavPyigLaT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-