General
-
Target
IMG_0345220_70260.exe
-
Size
881KB
-
Sample
240624-q1pewsvdqb
-
MD5
eeecd5c1b99750abaed98f60a297d6f8
-
SHA1
55ea6cecad35633792a5857f86d1925805a5d4a4
-
SHA256
203006061689a1e5ad0cb8710d3b30e532722e044a955765124b7cfc71d8fcb3
-
SHA512
64e3243b6241f724daee0b8354241aafd4b9847bd34e4b0c87192ad0d1c410ceeebda9c1213af986fbd49ef10eeb6acdbf0574ede2bd18a5f8aa7a86217e6050
-
SSDEEP
24576:FivnwHTxIRcJAT3yHW+jfj/JVZ4Lf1UC6JOzOH1:xJAT3yHW+jVbCK
Behavioral task
behavioral1
Sample
IMG_0345220_70260.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
IMG_0345220_70260.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
ypcog.shop - Port:
587 - Username:
[email protected] - Password:
NpsTFMpGBcoy - Email To:
[email protected]
http://103.130.147.85
Targets
-
-
Target
IMG_0345220_70260.exe
-
Size
881KB
-
MD5
eeecd5c1b99750abaed98f60a297d6f8
-
SHA1
55ea6cecad35633792a5857f86d1925805a5d4a4
-
SHA256
203006061689a1e5ad0cb8710d3b30e532722e044a955765124b7cfc71d8fcb3
-
SHA512
64e3243b6241f724daee0b8354241aafd4b9847bd34e4b0c87192ad0d1c410ceeebda9c1213af986fbd49ef10eeb6acdbf0574ede2bd18a5f8aa7a86217e6050
-
SSDEEP
24576:FivnwHTxIRcJAT3yHW+jfj/JVZ4Lf1UC6JOzOH1:xJAT3yHW+jVbCK
-
PureLog Stealer payload
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-