General
-
Target
756d8c698bbca87578cb149301ec30b0
-
Size
1.5MB
-
Sample
231226-rq1kvaefgr
-
MD5
756d8c698bbca87578cb149301ec30b0
-
SHA1
4e7d92eb81080f82f28248de1f6ab8c61bf2c75e
-
SHA256
d19cd3ea63e160767eca5daa7a64e91804a638c4f1b6fc0dce947e17da6d8e96
-
SHA512
18e7df6ec142233d1c9d459f26d5ef548fdb872995bec78c4324d7441d410e2cca930cf6a98307603b422976341c6a0e2f70d4c4abb5e315e971f7820b3238b5
-
SSDEEP
24576:G+ukjnYW5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ/:hNiecWx2XSx1GIoVMNQuiNB/e
Static task
static1
Behavioral task
behavioral1
Sample
756d8c698bbca87578cb149301ec30b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
756d8c698bbca87578cb149301ec30b0.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Chukwudim28@ - Email To:
[email protected]
Targets
-
-
Target
756d8c698bbca87578cb149301ec30b0
-
Size
1.5MB
-
MD5
756d8c698bbca87578cb149301ec30b0
-
SHA1
4e7d92eb81080f82f28248de1f6ab8c61bf2c75e
-
SHA256
d19cd3ea63e160767eca5daa7a64e91804a638c4f1b6fc0dce947e17da6d8e96
-
SHA512
18e7df6ec142233d1c9d459f26d5ef548fdb872995bec78c4324d7441d410e2cca930cf6a98307603b422976341c6a0e2f70d4c4abb5e315e971f7820b3238b5
-
SSDEEP
24576:G+ukjnYW5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ/:hNiecWx2XSx1GIoVMNQuiNB/e
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-