General
-
Target
fde3ff71fa6a80cd612d010879ce7ec36636cbc61ff23833514810a6e412ed6f
-
Size
342KB
-
Sample
231226-vcg35addbm
-
MD5
f82542732f7fc6ce4f9893118ff78f24
-
SHA1
a2ce743d069c01eb3dfebc7dddb821f713850e12
-
SHA256
fde3ff71fa6a80cd612d010879ce7ec36636cbc61ff23833514810a6e412ed6f
-
SHA512
bb484333133f91f14eeba1933dfdc47b9f42a7ba4d9a2519e107889f1f92d274e3a4b73a4d56248ff678ecd7de40c4cac642aab4a5304bda6e0c61436721e614
-
SSDEEP
6144:U54L5P2cXDoA/zb1tEYr3VZI9dSBKuehBrLds4kKW2x03x0mYVb154UhxiKC:A4L5P2czX/jT5ZwSBKuUBra4kKhW2JVQ
Static task
static1
Behavioral task
behavioral1
Sample
Ramona voy 2022003.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Ramona voy 2022003.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
Ramona voy 2022003.exe
-
Size
430KB
-
MD5
b56154e2714ac86af823d0eeb549d84d
-
SHA1
09e68a7275e1d21b5e6e28b9014790981cd0c5cd
-
SHA256
3a91774dd2b3db1a5670f1f974110bb09154a0b28e66fdeb8274164c6c41aa74
-
SHA512
0230267d992be14c8caeb469d85d5d31bff5664f50093af9b56f72311943cc9ce7fb0f8fc9ab00695768bd47bb031c258872e4acf5889e0df907822c307bc997
-
SSDEEP
12288:+lQjc/wxiNUzmVFLLUBd9nTPGWlQB/LVDquaLj99vXe:3eUYUzmV+LGWlQxLVHaX7/e
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-