General
-
Target
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe
-
Size
599KB
-
Sample
240508-qdgrjagd94
-
MD5
e0f288a7108a42a623bfeb29b27a3643
-
SHA1
1d5b4a130ed109335b4ae939fd9756afc2a161b2
-
SHA256
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b
-
SHA512
b0f0c97c7e1c6450b112fe6794a99a54ad0ac7c8a746edd214d6ce8e52fb625b75e892f30d96548c04e169f786656cbf1d52cf9571275b92dc13666923e199c4
-
SSDEEP
12288:taXiAEfDBDNm/UMNCZ2COqjKJHVKGgtCZ7jc1ESm5:aRE7BxUbNZqKZVtf7jWm
Static task
static1
Behavioral task
behavioral1
Sample
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ettehadco.com - Port:
587 - Username:
[email protected] - Password:
1S47f$kWB@2jAt&*R8NA - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe
-
Size
599KB
-
MD5
e0f288a7108a42a623bfeb29b27a3643
-
SHA1
1d5b4a130ed109335b4ae939fd9756afc2a161b2
-
SHA256
c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b
-
SHA512
b0f0c97c7e1c6450b112fe6794a99a54ad0ac7c8a746edd214d6ce8e52fb625b75e892f30d96548c04e169f786656cbf1d52cf9571275b92dc13666923e199c4
-
SSDEEP
12288:taXiAEfDBDNm/UMNCZ2COqjKJHVKGgtCZ7jc1ESm5:aRE7BxUbNZqKZVtf7jWm
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-