General
-
Target
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
-
Size
464KB
-
Sample
240307-dkk2badf96
-
MD5
1f7ac06f56077381b5097cde5c4cab87
-
SHA1
5738220c5460de988a1b30a3a9532fd226d9d3b8
-
SHA256
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb
-
SHA512
2426d1466ec06f3e67e3fdf7f01eb79cc11e46711e955e73a28d43dc5452881bfbd62d189c082d6b6224b58ab9f51a723d58688883c61ee7703cfcfeed0f2f3f
-
SSDEEP
12288:vCXFQTAajA6n1tiGSZ4EidlIw8mfcMAAAAAAAAAAMA5AAAAAAAAAAAAAAAAAAAAP:vqFQTAajA4fo4EiIw8ccMAAAAAAAAAAd
Static task
static1
Behavioral task
behavioral1
Sample
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
instalacionestasende.com - Port:
25 - Username:
[email protected] - Password:
VzX79@6v - Email To:
[email protected]
Targets
-
-
Target
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
-
Size
464KB
-
MD5
1f7ac06f56077381b5097cde5c4cab87
-
SHA1
5738220c5460de988a1b30a3a9532fd226d9d3b8
-
SHA256
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb
-
SHA512
2426d1466ec06f3e67e3fdf7f01eb79cc11e46711e955e73a28d43dc5452881bfbd62d189c082d6b6224b58ab9f51a723d58688883c61ee7703cfcfeed0f2f3f
-
SSDEEP
12288:vCXFQTAajA6n1tiGSZ4EidlIw8mfcMAAAAAAAAAAMA5AAAAAAAAAAAAAAAAAAAAP:vqFQTAajA4fo4EiIw8ccMAAAAAAAAAAd
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-