General
-
Target
Docu_60207.exe
-
Size
11KB
-
Sample
240806-r5vm5swajh
-
MD5
b68a44b4682a233202be2f2a72a7c43b
-
SHA1
5af0035b538748837e893ef42d23c5653c9b31ba
-
SHA256
fdadb6cfb3d0c231776c54357452d56bf8ef73d0f0f9c9aeee43c90c639703a3
-
SHA512
027799791ec263ba8e7c22b70633f97a89eb479ad19e881377a2407c1488a04ce61ded8fc569f52fdc6021e3cc6015057ee5dd69d725fb6868cdf7190fca3321
-
SSDEEP
192:HMpe8/EmUyPooFWPY43d5pVOKyncGC6/M5pBDG:Hj8cm7P5Fe3jrOKOcRD5X
Static task
static1
Behavioral task
behavioral1
Sample
Docu_60207.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Docu_60207.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
zulpine.shop - Port:
587 - Username:
[email protected] - Password:
zxYFr01PcZJl - Email To:
[email protected]
Targets
-
-
Target
Docu_60207.exe
-
Size
11KB
-
MD5
b68a44b4682a233202be2f2a72a7c43b
-
SHA1
5af0035b538748837e893ef42d23c5653c9b31ba
-
SHA256
fdadb6cfb3d0c231776c54357452d56bf8ef73d0f0f9c9aeee43c90c639703a3
-
SHA512
027799791ec263ba8e7c22b70633f97a89eb479ad19e881377a2407c1488a04ce61ded8fc569f52fdc6021e3cc6015057ee5dd69d725fb6868cdf7190fca3321
-
SSDEEP
192:HMpe8/EmUyPooFWPY43d5pVOKyncGC6/M5pBDG:Hj8cm7P5Fe3jrOKOcRD5X
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-