General
-
Target
84512883c9a07a5cd5ac394e7025b3ff8721d6b0f4aedf6e09552878b87634bc
-
Size
696KB
-
Sample
240517-gnsgcacd9w
-
MD5
7223976c1a3086ca69c7dd69213afd57
-
SHA1
82a450ce5cf8315152d9343a629522e0e059f950
-
SHA256
84512883c9a07a5cd5ac394e7025b3ff8721d6b0f4aedf6e09552878b87634bc
-
SHA512
2c2e4f318a2e8390eeaa59a556cca86203645943310105c38e2159ce6d7fa852f78ebd828476ca09bcf61338bd21b09c8d27fc5950cabf68d1e65b7fd1e675bc
-
SSDEEP
12288:Xe2+DztNxrZIYxMFKypdCFkydXwti5OnY+A9WXqSjmf495evK88zl:Xz+dNxVDyLO+o5Hs7QZvWzl
Static task
static1
Behavioral task
behavioral1
Sample
0a6f0b8ace6e7a43bc35e80cee2d7769c4ef3a994b4d38cd4bf7978dfc97c7e8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a6f0b8ace6e7a43bc35e80cee2d7769c4ef3a994b4d38cd4bf7978dfc97c7e8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.gbogboro.com - Port:
587 - Username:
[email protected] - Password:
Egoamaka@123
https://scratchdreams.tk
Targets
-
-
Target
0a6f0b8ace6e7a43bc35e80cee2d7769c4ef3a994b4d38cd4bf7978dfc97c7e8.exe
-
Size
1.1MB
-
MD5
56c2e79168a27d15ada4499a0c3feec9
-
SHA1
7797ea5dc3cd1191d5ebb051f62f79849b6835ce
-
SHA256
0a6f0b8ace6e7a43bc35e80cee2d7769c4ef3a994b4d38cd4bf7978dfc97c7e8
-
SHA512
426625985be91c443716a9f68ffdc6667cc5129e2ee4ef554472ab43f8c9a3c037dbc8d9591d99827b0f7fc27c22fb9e793c4a3a947158ca2866df52b166e0f6
-
SSDEEP
12288:agdVYTTZEcmgH5KqlyGNb5AdER2wOBgNAXrO50Zx0k3eOGIRl6QJn0WpoJpx5oCH:agdVYhHQqcE2BbX/QCc2VUprodc
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-