General
-
Target
507bd648ef92cdf84a835e9b5498317fba43ce1f77bc7348ecff5d0f42d73779
-
Size
658KB
-
Sample
240417-rxlp9sdf8v
-
MD5
541bfa14ac9f6b0b2ba2f86930bd8849
-
SHA1
3acb3e53238f8797ae3fffc9a667bea585680c49
-
SHA256
507bd648ef92cdf84a835e9b5498317fba43ce1f77bc7348ecff5d0f42d73779
-
SHA512
8d0c2a8541e5c9670a9b80e0b71a8dad26dc48c7bd7ad9f10a86a0e6e211f75fc68c9319fe2f50e702df9408969d4f4627f3de686099193ce00d5f420eac0d84
-
SSDEEP
12288:DZnpUSQVMKr6+el9tWd3m4yUD4jAtEmJXFM8a/NwBM0Euy5ahh4:DBpnIMKrhM9Q1m4yU0AtnaV/NwBNI0S
Static task
static1
Behavioral task
behavioral1
Sample
e98837d8a5c7bde223cc25822eea7c8a42f2ebfa4afb69a7392779ac7f5399dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e98837d8a5c7bde223cc25822eea7c8a42f2ebfa4afb69a7392779ac7f5399dc.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
http://varders.kozow.com:8081
http://aborters.duckdns.org:8081
http://anotherarmy.dns.army:8081
Targets
-
-
Target
e98837d8a5c7bde223cc25822eea7c8a42f2ebfa4afb69a7392779ac7f5399dc.exe
-
Size
959KB
-
MD5
40072478a55c3c4ab3faa21e333bcf42
-
SHA1
8f32107360bfa1d7a89bddb24da1edb6ec539a11
-
SHA256
e98837d8a5c7bde223cc25822eea7c8a42f2ebfa4afb69a7392779ac7f5399dc
-
SHA512
1217992479a2a58fd297d76215a46866123a9bec61dfd5d37e7e46d7c0cf9fdef1141689a907d5641a47827c4b992e9c6a66750506401115d295e8e7be6127ae
-
SSDEEP
24576:y4V68yq0N4DJYNYZrwxsTDT9ebdHG9cx6:y4VsqCc0YRwxOT9kHG
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-