General
-
Target
MT Sea Gull 9 Particulars.exe
-
Size
491KB
-
Sample
240614-x8x6bsxaln
-
MD5
bfcf16b61252cc02fa2b336953c471cf
-
SHA1
736aacda3a3c45f81d8c569c4874e8ce012aae9e
-
SHA256
eb2872f8fda5c670a3eb885e34419bb937e7dc9c5cbde9c4536db942d88fd8bb
-
SHA512
bed1ee6d9956ce361ef6c9ce1e3b68f775ad926e1a5499b8b95763975e70577bda4ed9862e48c9f92a8c1b1eecd826ce3db860eed8fbb42e7b63a94dff8043cb
-
SSDEEP
6144:SrAtowVO25VCgRz0ooOqdM250wOSKeL4gL+4q00m89XhbbJCq9AbcJ8lKX:ttt659a4l0m89RnJbmbWX
Static task
static1
Behavioral task
behavioral1
Sample
MT Sea Gull 9 Particulars.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
MT Sea Gull 9 Particulars.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
fY,FLoadtsiF
http://103.130.147.85
Targets
-
-
Target
MT Sea Gull 9 Particulars.exe
-
Size
491KB
-
MD5
bfcf16b61252cc02fa2b336953c471cf
-
SHA1
736aacda3a3c45f81d8c569c4874e8ce012aae9e
-
SHA256
eb2872f8fda5c670a3eb885e34419bb937e7dc9c5cbde9c4536db942d88fd8bb
-
SHA512
bed1ee6d9956ce361ef6c9ce1e3b68f775ad926e1a5499b8b95763975e70577bda4ed9862e48c9f92a8c1b1eecd826ce3db860eed8fbb42e7b63a94dff8043cb
-
SSDEEP
6144:SrAtowVO25VCgRz0ooOqdM250wOSKeL4gL+4q00m89XhbbJCq9AbcJ8lKX:ttt659a4l0m89RnJbmbWX
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-