General
-
Target
5a4a93f2575eb856a8eefd6e51480edb
-
Size
492KB
-
Sample
240114-e56n7acbdj
-
MD5
5a4a93f2575eb856a8eefd6e51480edb
-
SHA1
67a6a61e29fa3d676bd3a2c3f41eb3bdeb38fc0b
-
SHA256
b3139cd800107b9fe4d5bef34bbb21281c8a4432adb990be5f4e99c3df3a86eb
-
SHA512
5414b189f236d70bf9e538b1adea2aa7738717268ce02775c404821c2d5a75047303c10f090eaa660b0c5731fe384612fd46b426371177a19d0ea8790b00d10a
-
SSDEEP
12288:Ld53TvpHeIl0qH98Xcx0JBv1N+GUhL95gU9k3OsJ2a:Ld53TvpHeIl0HCz9SXJ2a
Static task
static1
Behavioral task
behavioral1
Sample
5a4a93f2575eb856a8eefd6e51480edb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a4a93f2575eb856a8eefd6e51480edb.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.1and1.es - Port:
25 - Username:
[email protected] - Password:
Somunics.1234 - Email To:
[email protected]
Targets
-
-
Target
5a4a93f2575eb856a8eefd6e51480edb
-
Size
492KB
-
MD5
5a4a93f2575eb856a8eefd6e51480edb
-
SHA1
67a6a61e29fa3d676bd3a2c3f41eb3bdeb38fc0b
-
SHA256
b3139cd800107b9fe4d5bef34bbb21281c8a4432adb990be5f4e99c3df3a86eb
-
SHA512
5414b189f236d70bf9e538b1adea2aa7738717268ce02775c404821c2d5a75047303c10f090eaa660b0c5731fe384612fd46b426371177a19d0ea8790b00d10a
-
SSDEEP
12288:Ld53TvpHeIl0qH98Xcx0JBv1N+GUhL95gU9k3OsJ2a:Ld53TvpHeIl0HCz9SXJ2a
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-