General
-
Target
29147631e89dcb9d3dfe17a9d893f40036197f56d0d89409c8bc0255f3124a10.zip
-
Size
297KB
-
Sample
240611-bgjmzaxhkd
-
MD5
3e9cd04edca71a1f1c52611d119383ef
-
SHA1
8a50a8f67d014a8f55de10dc72367d6602613bb1
-
SHA256
29147631e89dcb9d3dfe17a9d893f40036197f56d0d89409c8bc0255f3124a10
-
SHA512
1143837b38e205964b7e16939cb61d40f52541c10fcd149c2e15db882634e38e889f65d152529bef01d411dedb05788fc88420220d6ec60cbb25d06c9e426e91
-
SSDEEP
6144:s64jxHEEQj4HyZpkG3ib8VNAQEDSkZMTA6A3pDrQIK:idkERHtG3++SQRkZcA53py
Static task
static1
Behavioral task
behavioral1
Sample
Office Suppliers Order.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Office Suppliers Order.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
fY,FLoadtsiF
http://103.130.147.85
Targets
-
-
Target
Office Suppliers Order.exe
-
Size
491KB
-
MD5
a7792cb3a690bac7f8ee651507b3d144
-
SHA1
045251215b95d3e8005d015e5372715ff5bf7acc
-
SHA256
c00363603655a42e3a2358992af739153ca55c0dc3df2868f25390d5ecdbf734
-
SHA512
f242f3426d84bd1e187c2ca21d501456ed0a46df690c712c937d99326b0d8f4ddc4be61e7ff7745b72a42f83ecc901d9e46de9eebecbb0dd2a96688a9f475983
-
SSDEEP
12288:ttMyF3ltmawOVahfG3+CSQ9vkk93YmCWWsGf:XM6ltmJa+CSQCk93XWsq
Score10/10-
Snake Keylogger payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables with potential process hoocking
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-