General
-
Target
04fef3eadffd06e1b7ad1358dd8b6cde.bin
-
Size
588KB
-
Sample
240403-bcvvfaba72
-
MD5
2be5100b916c98fac056df62dbfdddb2
-
SHA1
146f1c9f77fc71bf71db60ffe84349e7ffdf2eda
-
SHA256
d1583a02b935ae8b99a85c1c06db78d2b1180c52eb089fef20da2299c0776cd1
-
SHA512
e2a8eef29a91fff9a7b550a064698ce47e279334e38fc29f55a267cb2133282764eef6f5c548f50a85a2780d88574e05dce1ba290c27ca802cae5d6867dfcabf
-
SSDEEP
12288:Khyj0pUBZie4qrD3ZSYBg+jyYolAMsw+7ERP4+5UffVL:Kh4j8PbUw+7qZ5qtL
Behavioral task
behavioral1
Sample
OURO08765.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
OURO08765.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
OURO08765.exe
-
Size
725KB
-
MD5
4b0a935fbc037ea00bf17468d4cf5b85
-
SHA1
169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed
-
SHA256
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea
-
SHA512
0bee469d0188505772af1fd9af4a6710c201475340045b97024102a63aaba14f940e6ee36d118d338e836b4ee7ba03387001ce81724c4f4433123f5b9d83dd4f
-
SSDEEP
12288:w6Wq4aaE6KwyF5L0Y2D1PqL5C38Lua13KVsrOQW60Ztsmhv3:GthEVaPqL58F2rBjmB3
Score10/10-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-