General
-
Target
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44.exe
-
Size
2.6MB
-
Sample
240902-w8dk9avenj
-
MD5
3e1f185aa42c5d7b275355e2d78c6365
-
SHA1
3f499d7ac948a1da5c5298c158d265264d506a64
-
SHA256
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44
-
SHA512
4babb114f964bf2533bd4f65e2f33b0f2beedae89628e864c950f9c546b9738ff034d6dc5fb1dcd36868b701e535d17e9592efee2b97b11e2ca4389668865305
-
SSDEEP
49152:V1DrRvqVae63Uss55oN1C5Urhx0wFWXZlXvK4iIW/Wm8oCubZe+cw:V7qAc5o0YcwQXTtSWmTbZOw
Static task
static1
Behavioral task
behavioral1
Sample
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
jertcot.shop - Port:
587 - Username:
[email protected] - Password:
UjFGuShvgVH4 - Email To:
[email protected]
Targets
-
-
Target
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44.exe
-
Size
2.6MB
-
MD5
3e1f185aa42c5d7b275355e2d78c6365
-
SHA1
3f499d7ac948a1da5c5298c158d265264d506a64
-
SHA256
83cc76639224b1e78e15480cd1911474c28224ac39a72cd1ffd85aca400fcf44
-
SHA512
4babb114f964bf2533bd4f65e2f33b0f2beedae89628e864c950f9c546b9738ff034d6dc5fb1dcd36868b701e535d17e9592efee2b97b11e2ca4389668865305
-
SSDEEP
49152:V1DrRvqVae63Uss55oN1C5Urhx0wFWXZlXvK4iIW/Wm8oCubZe+cw:V7qAc5o0YcwQXTtSWmTbZOw
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-