General
-
Target
5f8fc87ce2f6345fcf0e10c64be58db5a907c0acd393140387e2da2dc39f3551
-
Size
330KB
-
Sample
240417-rfva3sbb64
-
MD5
85ee58811778201512b387f22eca40c5
-
SHA1
7d66f825ffd531bd9b726b26f914cad038b3de8b
-
SHA256
5f8fc87ce2f6345fcf0e10c64be58db5a907c0acd393140387e2da2dc39f3551
-
SHA512
a9f0ecba9d89d02c46089eb262dd702548e3fcaaf1ae3ce65658fa73857521873a0751c7cdde39e1e267c7776c69945b21dc1a488d11511ef3f66f012c8e8745
-
SSDEEP
6144:7wnPhoks6rCgbJBUOxLIyrNQ9rBrQYLARqljzwZWdgDT/o+wBhD7V8EF9ka:6Pyz6mY+OayroVrQY0Il3L+cV8Eh
Static task
static1
Behavioral task
behavioral1
Sample
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
instalacionestasende.com - Port:
25 - Username:
[email protected] - Password:
VzX79@6v - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb.exe
-
Size
464KB
-
MD5
1f7ac06f56077381b5097cde5c4cab87
-
SHA1
5738220c5460de988a1b30a3a9532fd226d9d3b8
-
SHA256
d3731523378b28ee05796acb58b58f60f9f6021e239189acb06907abe5d008cb
-
SHA512
2426d1466ec06f3e67e3fdf7f01eb79cc11e46711e955e73a28d43dc5452881bfbd62d189c082d6b6224b58ab9f51a723d58688883c61ee7703cfcfeed0f2f3f
-
SSDEEP
12288:vCXFQTAajA6n1tiGSZ4EidlIw8mfcMAAAAAAAAAAMA5AAAAAAAAAAAAAAAAAAAAP:vqFQTAajA4fo4EiIw8ccMAAAAAAAAAAd
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-