General
-
Target
scan copy.jar
-
Size
1.2MB
-
Sample
240223-tzsygadb96
-
MD5
7a9f52bf41ae0b6bb82828c1249f954d
-
SHA1
7a0755477f5523fce6c3333fff0c4f69902248e7
-
SHA256
9bcda9f3c4d2080696f278d4a7cd828c652136925747983a5314ba0a2d991e77
-
SHA512
ef865a969c6be89ea09379dd5ea2dec23a0f0a809d90bcf56c50d926ff1578a4e13e70bb9a17c6dfc218af8d74616652c39577bc816da286592884e10efe1204
-
SSDEEP
24576:j7vOMeCeCtD+pJ5XSUPHXz9+CtD+pJ5XSUPHXz9r:jrO9CC5XRY5XRV
Static task
static1
Behavioral task
behavioral1
Sample
scan copy.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
scan copy.jar
Resource
win10v2004-20240221-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.bhojwanindia.com - Port:
587 - Username:
[email protected] - Password:
bombayoffice123
Targets
-
-
Target
scan copy.jar
-
Size
1.2MB
-
MD5
7a9f52bf41ae0b6bb82828c1249f954d
-
SHA1
7a0755477f5523fce6c3333fff0c4f69902248e7
-
SHA256
9bcda9f3c4d2080696f278d4a7cd828c652136925747983a5314ba0a2d991e77
-
SHA512
ef865a969c6be89ea09379dd5ea2dec23a0f0a809d90bcf56c50d926ff1578a4e13e70bb9a17c6dfc218af8d74616652c39577bc816da286592884e10efe1204
-
SSDEEP
24576:j7vOMeCeCtD+pJ5XSUPHXz9+CtD+pJ5XSUPHXz9r:jrO9CC5XRY5XRV
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-