General
-
Target
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880.exe
-
Size
432KB
-
Sample
240608-jarn1abb35
-
MD5
5b541c6a1f61ddeebe5c13b912e1574e
-
SHA1
65eb36a35270c65c2efc9da05e445a959da03935
-
SHA256
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880
-
SHA512
9ba071dc6b2a613005670203b605fdf0dcf6219219c2312f62bcc3e35186567d414a5f3a9657fe52df1ba5ff2c040a0eac68e87917d1b4b1d09d06effede0c82
-
SSDEEP
6144:HGGQjEEoXW8SzpzfC0e//0xn3dVQe4Sf1BBQwIb84mB9kXjhoa4cXDSJDRa4S2:mGQjEEMBSBfC0B3fQR7b1YDYQ7
Static task
static1
Behavioral task
behavioral1
Sample
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
fY,FLoadtsiF
http://103.130.147.85
Targets
-
-
Target
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880.exe
-
Size
432KB
-
MD5
5b541c6a1f61ddeebe5c13b912e1574e
-
SHA1
65eb36a35270c65c2efc9da05e445a959da03935
-
SHA256
f53b6f8e91679e4eab7e2110784331f775af9c0956dccdc49a217157bc5b8880
-
SHA512
9ba071dc6b2a613005670203b605fdf0dcf6219219c2312f62bcc3e35186567d414a5f3a9657fe52df1ba5ff2c040a0eac68e87917d1b4b1d09d06effede0c82
-
SSDEEP
6144:HGGQjEEoXW8SzpzfC0e//0xn3dVQe4Sf1BBQwIb84mB9kXjhoa4cXDSJDRa4S2:mGQjEEMBSBfC0B3fQR7b1YDYQ7
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-