General
-
Target
4b0a935fbc037ea00bf17468d4cf5b85.bin
-
Size
588KB
-
Sample
240403-bqa27abf85
-
MD5
fefaaaabe00b947022319abedbf047b5
-
SHA1
59b4cec33e57b111b43ea511bb40644910d59707
-
SHA256
e3364410363952f872fec3e73a9cd7945aa1d25b5b2fcb137b4cc57d33452f4f
-
SHA512
357b9e4c72830993ad37ebe3ee12bff39decf7107e9df7c0b9a2882ed04edd55afe44a1f92b5b1b883db515b2fe00ecbaca39d45a40ab2b83ba98cee9ad8b5b1
-
SSDEEP
12288:foecbEslu5gI7yiQnTv2S/uojrBi9+o3pvlkiIQ+EkHGkCqTprRYjwji:Qy5R7yf748Bi9+gdkG+E9kVTMjci
Behavioral task
behavioral1
Sample
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
-
Size
725KB
-
MD5
4b0a935fbc037ea00bf17468d4cf5b85
-
SHA1
169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed
-
SHA256
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea
-
SHA512
0bee469d0188505772af1fd9af4a6710c201475340045b97024102a63aaba14f940e6ee36d118d338e836b4ee7ba03387001ce81724c4f4433123f5b9d83dd4f
-
SSDEEP
12288:w6Wq4aaE6KwyF5L0Y2D1PqL5C38Lua13KVsrOQW60Ztsmhv3:GthEVaPqL58F2rBjmB3
Score10/10-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-