General
-
Target
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3.exe
-
Size
463KB
-
Sample
240307-dpby7sdg48
-
MD5
9987897aaaaf01d04b9377723f1fdd1d
-
SHA1
8cfc69dae7ce0421f183b40573a3060797687bff
-
SHA256
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3
-
SHA512
12b6966c45c9aeb3b7486ae969d4c5e0c56dcf3fa48cb9a772ddcf1666f759e8cb9eb498484d5910c17c2bcb616d838fbf877eece8a08ffff0a8dc49bdca9941
-
SSDEEP
12288:3CXF+TAHqAZJgp+8uwIeuWtaGAxpmkUt5aCOgRFdXg70WhEDAAAAAAAAAAAAAAAM:3qF+TAHqAopTuBkaLHmkUXPdLgYiEDA0
Static task
static1
Behavioral task
behavioral1
Sample
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.noscoegypt.com - Port:
587 - Username:
[email protected] - Password:
HR2023%%Nosco
Targets
-
-
Target
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3.exe
-
Size
463KB
-
MD5
9987897aaaaf01d04b9377723f1fdd1d
-
SHA1
8cfc69dae7ce0421f183b40573a3060797687bff
-
SHA256
e8d481924c090333dd7e0c1f9b3eca1711bbc3317796f8b30a5d29dab64aaee3
-
SHA512
12b6966c45c9aeb3b7486ae969d4c5e0c56dcf3fa48cb9a772ddcf1666f759e8cb9eb498484d5910c17c2bcb616d838fbf877eece8a08ffff0a8dc49bdca9941
-
SSDEEP
12288:3CXF+TAHqAZJgp+8uwIeuWtaGAxpmkUt5aCOgRFdXg70WhEDAAAAAAAAAAAAAAAM:3qF+TAHqAopTuBkaLHmkUXPdLgYiEDA0
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-