General
-
Target
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372.exe
-
Size
958KB
-
Sample
240408-bmpfeacc9t
-
MD5
c52c8f03c7a947a1f84657f2c3283494
-
SHA1
6834be8e80716d9cea18d10bcca6aabfdb23572b
-
SHA256
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372
-
SHA512
ded8fc22a5616df365bdb40d9ff483afa8d6bc57893fcc082eba54a249c35d1149e1912012e26edc2744867625dbc47446ed8bf4ea5a4c4a434ebfd5414eff65
-
SSDEEP
24576:W2q2Fi8ek23cTBRQMBbZxsGualRrwvYh:W2Bi8ek234RZ8balRrwvYh
Static task
static1
Behavioral task
behavioral1
Sample
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.qoldenfrontier.com - Port:
587 - Username:
[email protected] - Password:
%2WMoWREUv@3
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.qoldenfrontier.com - Port:
587 - Username:
[email protected] - Password:
%2WMoWREUv@3 - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372.exe
-
Size
958KB
-
MD5
c52c8f03c7a947a1f84657f2c3283494
-
SHA1
6834be8e80716d9cea18d10bcca6aabfdb23572b
-
SHA256
39b5db919a6e2320e74753b6fafa6950e8b9a313340345a2eb0f9abf8cd43372
-
SHA512
ded8fc22a5616df365bdb40d9ff483afa8d6bc57893fcc082eba54a249c35d1149e1912012e26edc2744867625dbc47446ed8bf4ea5a4c4a434ebfd5414eff65
-
SSDEEP
24576:W2q2Fi8ek23cTBRQMBbZxsGualRrwvYh:W2Bi8ek234RZ8balRrwvYh
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-