General
-
Target
Purchase Order.exe
-
Size
524KB
-
Sample
240405-lvgqmsgh41
-
MD5
25a46527b42b425083fe4778768f2073
-
SHA1
837219cc634a58cb7c10be9a5d6759562eb8d3f3
-
SHA256
190504e991bb8bb608cf87db9ee7c7549999a17970251490ce85282f85cb49aa
-
SHA512
afc0a18d8fc87168c144d274c7ffc39537a303d6fc02e6aa59d1ea3a116313a4fd6b4c32a91f33ceefcb33917447bd2c3eb2b962da67fffd339d7dee6bc67471
-
SSDEEP
12288:JrLz6jG8UHRVVLHxjNFD04RUBFQG27TGS7oukJ0aSahC5ri78c5:0GTHhLB04uGTGOkGaHhCpi7R
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EbxKZL@2
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
Purchase Order.exe
-
Size
524KB
-
MD5
25a46527b42b425083fe4778768f2073
-
SHA1
837219cc634a58cb7c10be9a5d6759562eb8d3f3
-
SHA256
190504e991bb8bb608cf87db9ee7c7549999a17970251490ce85282f85cb49aa
-
SHA512
afc0a18d8fc87168c144d274c7ffc39537a303d6fc02e6aa59d1ea3a116313a4fd6b4c32a91f33ceefcb33917447bd2c3eb2b962da67fffd339d7dee6bc67471
-
SSDEEP
12288:JrLz6jG8UHRVVLHxjNFD04RUBFQG27TGS7oukJ0aSahC5ri78c5:0GTHhLB04uGTGOkGaHhCpi7R
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-