General
-
Target
31052024_1638_31052024_Shipment Details.zip
-
Size
299KB
-
Sample
240531-t5vz1sec2t
-
MD5
12eca945b1a53e928bd2fa5e193154aa
-
SHA1
e20e2faf59781db64e70e9e978eb40f5346ba228
-
SHA256
3fd9b94e35054c09e2e98340bf13b6dda8e116581f93e70e5569960476af6747
-
SHA512
99c9c40a067ab4f5e8f1e20abdccee03d1d3770ee8fcb456da2718ae502177711814f6a6303e151ff59814e48ed33d4323b8aac90341cd1cb24b8ac4fb830b9a
-
SSDEEP
6144:JHEQeWihHD05hC0j5kX6n7CSDdY8F8aaVhGcAzgCP:JHWWiZg5hDj5kK7tAhFoHP
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Details.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Shipment Details.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
iU0Ta!$K8L51
http://103.130.147.85
Targets
-
-
Target
Shipment Details.exe
-
Size
487KB
-
MD5
872bbb237a362dcbb6ed49f2cf08ce00
-
SHA1
0dee059eca565849ede6ae714c6d54f38ab00eb6
-
SHA256
61455fae1e8e4d16ed8767aa93f1395472f7bb5834af3bd187e59b2f86b232b1
-
SHA512
400e2fd34fd78746d79c3aeef48bb55418249ca668ee9c75dcfa821553b1ef1208a5746cb3c8952634e5727c096d4b52bcffd02d2d53a7be56ed48888c6051fd
-
SSDEEP
12288:O2k7qtj0tLZ7ROdEUYBvk7ntTh2YKyCMHjeEG2E5LgU/EnclpEOMEw/EEEEGEhJY:CrvEG2E5LgU/EnclpEOMEw/EEEEGEhJY
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-