General
-
Target
3988c73d0fe8cc854333752bc9c16413
-
Size
547KB
-
Sample
231231-rl7tcscfgr
-
MD5
3988c73d0fe8cc854333752bc9c16413
-
SHA1
607cf59d672fc032bcd63caa0e77b0c3a62121b9
-
SHA256
78c0352da41b3c206b12ea2d8d3f96c33c361e2211437c9746629023b1f0c094
-
SHA512
1ac7d447c0ce756af2bfc381dc1c8d939e0e649d76ead8da7d9abd24dee3758192a6bd0cd9bcef5e72f2df507a18a8f1bde3b89867eb17895fb0f18b0faf0744
-
SSDEEP
12288:iDjhrIh5IkB3OH3tguqnqd6KcuM4ry5ehNhjKUSotTkFW/Y74U:iDjhr0IJ9gydpcB4Q
Static task
static1
Behavioral task
behavioral1
Sample
3988c73d0fe8cc854333752bc9c16413.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3988c73d0fe8cc854333752bc9c16413.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
webmail.aquariushotelboutique.com - Port:
25 - Username:
[email protected] - Password:
6)fvPIxcEVwT - Email To:
[email protected]
Targets
-
-
Target
3988c73d0fe8cc854333752bc9c16413
-
Size
547KB
-
MD5
3988c73d0fe8cc854333752bc9c16413
-
SHA1
607cf59d672fc032bcd63caa0e77b0c3a62121b9
-
SHA256
78c0352da41b3c206b12ea2d8d3f96c33c361e2211437c9746629023b1f0c094
-
SHA512
1ac7d447c0ce756af2bfc381dc1c8d939e0e649d76ead8da7d9abd24dee3758192a6bd0cd9bcef5e72f2df507a18a8f1bde3b89867eb17895fb0f18b0faf0744
-
SSDEEP
12288:iDjhrIh5IkB3OH3tguqnqd6KcuM4ry5ehNhjKUSotTkFW/Y74U:iDjhr0IJ9gydpcB4Q
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-