General
-
Target
DNXS-04-22.exe
-
Size
868KB
-
Sample
240502-gpqn5sag3x
-
MD5
64932c473d74fbdfdb706a094543cf37
-
SHA1
f19b8960681b56cab45a9f14871108cf4d522251
-
SHA256
8b9dedaa09d239667dd9cabe0c7efab61712868b32ebb3a50110df8980823ce9
-
SHA512
1f662c50b378e5be0dc6faec894fb7266417b5ac2952583efdb6801f873bd5c52e3a6d8d001491ee668c1142456ef33d606f2be7be6749840ac819b70d0023dd
-
SSDEEP
12288:y2iNzeWFm+1okFwe6N9LtinuoFZK4s5ehC3s5IrA6tN/uYiXdwsh:y1tRFm+1okFPOtT4OgC3s5IlNxi
Static task
static1
Behavioral task
behavioral1
Sample
DNXS-04-22.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DNXS-04-22.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.eraslangroup.net - Port:
587 - Username:
[email protected] - Password:
aHZAyjDK - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
DNXS-04-22.exe
-
Size
868KB
-
MD5
64932c473d74fbdfdb706a094543cf37
-
SHA1
f19b8960681b56cab45a9f14871108cf4d522251
-
SHA256
8b9dedaa09d239667dd9cabe0c7efab61712868b32ebb3a50110df8980823ce9
-
SHA512
1f662c50b378e5be0dc6faec894fb7266417b5ac2952583efdb6801f873bd5c52e3a6d8d001491ee668c1142456ef33d606f2be7be6749840ac819b70d0023dd
-
SSDEEP
12288:y2iNzeWFm+1okFwe6N9LtinuoFZK4s5ehC3s5IrA6tN/uYiXdwsh:y1tRFm+1okFPOtT4OgC3s5IlNxi
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-