General
-
Target
SnapHacker.zip
-
Size
13.6MB
-
Sample
240222-2km3nsgd95
-
MD5
4f7fcdb46fb294597874c80693a97fd0
-
SHA1
045f79a71513c59d618e25b1d115fe720c3b695d
-
SHA256
d3ff84dfc1f23d3d2016cabf1149038c97f4651c6f6d75181a43a432d8e86afd
-
SHA512
1409fb850af7f5df6390fd8b367fa844dd90984a68bc5774e2305601fa924ea14608a5885931503b2df09d101aac876eaead1fb8374552f2a6d93eed05a163e3
-
SSDEEP
393216:Xtg6ivGICSRv1D84DH8Q6NBKuvn04fNQiUhn/CptGkZ2CX:YvLCSrD84rD6ye0ENQiUdqbZDX
Behavioral task
behavioral1
Sample
SnapHacker.zip
Resource
win10v2004-20240221-es
Behavioral task
behavioral2
Sample
SnapHacker/How does it work.txt
Resource
win10v2004-20240221-es
Behavioral task
behavioral3
Sample
SnapHacker/snaphack.exe
Resource
win10v2004-20240221-es
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20240221-es
Behavioral task
behavioral5
Sample
SnapHacker/start.txt
Resource
win10v2004-20240221-es
Malware Config
Targets
-
-
Target
SnapHacker.zip
-
Size
13.6MB
-
MD5
4f7fcdb46fb294597874c80693a97fd0
-
SHA1
045f79a71513c59d618e25b1d115fe720c3b695d
-
SHA256
d3ff84dfc1f23d3d2016cabf1149038c97f4651c6f6d75181a43a432d8e86afd
-
SHA512
1409fb850af7f5df6390fd8b367fa844dd90984a68bc5774e2305601fa924ea14608a5885931503b2df09d101aac876eaead1fb8374552f2a6d93eed05a163e3
-
SSDEEP
393216:Xtg6ivGICSRv1D84DH8Q6NBKuvn04fNQiUhn/CptGkZ2CX:YvLCSrD84rD6ye0ENQiUdqbZDX
Score1/10 -
-
-
Target
SnapHacker/How does it work.txt
-
Size
221B
-
MD5
d0fabe81993f2401f2acdd2e6c9463e6
-
SHA1
944164a1d3c029f9c20d680353f3fe7a9178697a
-
SHA256
c7bf7bcfd0f5d50d2f6db0bb38ee0e8fdd88144c0a1fca3dc02a4c28a2a47d30
-
SHA512
c9676278d2aab6ae59c8c5ed7639d5caafa5571a428ed838fe1583dd70e093439bc58ac96508c743595c672205ef6c7054672874bce1cb0c10696ab21cab4d5e
Score1/10 -
-
-
Target
SnapHacker/snaphack.exe
-
Size
13.8MB
-
MD5
06f5caf0ddf8b1e3033d83d358d97631
-
SHA1
9f867ea09185e9159cb91cd9aac8af7c2e525fd8
-
SHA256
a69d061a91d9c159b957e89ee547c285e803030e40d9ab8f9a0d8ec88bf95559
-
SHA512
74a4ba7f1a2475c4be1e6d3f2f3bf537f15a995485b1260f3d65eb8b0ca9c4b86d8fcdaad15dc8bb2dc250bdd4599387a727089a422bd11e6c6034acf01c16cd
-
SSDEEP
393216:riIE7Yo5D2nwW+eGQRIMTozGxu8C0ibfz6e57F1bmXdWCNx+:Y7r5DawW+e5R5oztZ026e5XkVN4
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Creal.pyc
-
Size
334KB
-
MD5
24e2d00223b3cb446e2c493fdd162a38
-
SHA1
3c945e57d7d86414ff0d939c389e4f4f60d675f9
-
SHA256
e4c4f00f98561a5b6582473a0af94f70a042a3940203b902a81c89c636e4da65
-
SHA512
dd6c173c41bd82107fdb94b967f99fb70cadb922e34959733a9c907e685f770589d17b7e5a8b139818ee4d4cd89e64a7f106ba7364c466c14a6c58301922df52
-
SSDEEP
3072:cg7MaNdUcd6rQ5Ap9ypIAXJzYmfiTNh3zDv80R4KTEI2EBqdb27kEXSb:MQUg605ApAzYmfiTNh3zDv8GT72EBEOi
Score3/10 -
-
-
Target
SnapHacker/start.txt
-
Size
18B
-
MD5
65b2307799bee494f3ff9637080aadae
-
SHA1
f6330c68d7ec373e4a74503bbfee3716fbed8e7a
-
SHA256
07bd5e49efecedec7cb293a89d061f6e04c5f9f1083082a23d59fbba995d6f74
-
SHA512
0af9bcd013dcf3d0c0cca8161eaeb3af3f193f8b6893ab00b7d3c84077e1c4a4fe93579b0329ad501ff4b0e7eda2d5f4d881008d2094eb595b44ef17b0685376
Score1/10 -