General
-
Target
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b.exe
-
Size
491KB
-
Sample
240406-bs432sge3t
-
MD5
10e2a14bbd30f30c2cb7260741a3d70f
-
SHA1
aaf6c61c6f5e908e164de1b539096caf9fd9b4d2
-
SHA256
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b
-
SHA512
c5c6f9aaad1299239264b0a4ae2012f0ef477bca2f28d7c6900893e8f81141c5b5113979b50f25dd5637da332e4418bd96a3000a9307c0e4e9542ace2a512618
-
SSDEEP
12288:r5UHYFLi26lnnhwrqslyuBRlGxR7LBGJi:KHYFLiPlhwGKyuLlGxtwY
Static task
static1
Behavioral task
behavioral1
Sample
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EbxKZL@2
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b.exe
-
Size
491KB
-
MD5
10e2a14bbd30f30c2cb7260741a3d70f
-
SHA1
aaf6c61c6f5e908e164de1b539096caf9fd9b4d2
-
SHA256
8fb359ccf3a3b6a0eff8204f9ee27c2dc41b3270721716192a7ef9253453b59b
-
SHA512
c5c6f9aaad1299239264b0a4ae2012f0ef477bca2f28d7c6900893e8f81141c5b5113979b50f25dd5637da332e4418bd96a3000a9307c0e4e9542ace2a512618
-
SSDEEP
12288:r5UHYFLi26lnnhwrqslyuBRlGxR7LBGJi:KHYFLiPlhwGKyuLlGxtwY
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables packed with SmartAssembly
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-