General
-
Target
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab.exe
-
Size
506KB
-
Sample
240404-cps22sca4v
-
MD5
4a14a9dedd4dfe259949539090ccc9fe
-
SHA1
31d7fe0d77ef9b7d3df2f1a2865c3823b116991e
-
SHA256
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab
-
SHA512
87a4f19ce0391e07cf44a90476e180e1d0d7593f760044cc1a264a4d633f458b5d4965acbfceae692936e5263af396b8293644cc17fed97b379a2eb716333210
-
SSDEEP
12288:Mhfsby3wzyYyVF/W6OTj1JucaNz3ie6m/dzb8B+:PewzyYMfa1JZaVye6Ab8k
Static task
static1
Behavioral task
behavioral1
Sample
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EbxKZL@2
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab.exe
-
Size
506KB
-
MD5
4a14a9dedd4dfe259949539090ccc9fe
-
SHA1
31d7fe0d77ef9b7d3df2f1a2865c3823b116991e
-
SHA256
9fc2770fbd67c9b6f9f244ac6ac0fa8810c3d50e08c7d77b332bf1447ab77fab
-
SHA512
87a4f19ce0391e07cf44a90476e180e1d0d7593f760044cc1a264a4d633f458b5d4965acbfceae692936e5263af396b8293644cc17fed97b379a2eb716333210
-
SSDEEP
12288:Mhfsby3wzyYyVF/W6OTj1JucaNz3ie6m/dzb8B+:PewzyYMfa1JZaVye6Ab8k
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables packed with SmartAssembly
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-