General
-
Target
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe
-
Size
1.1MB
-
Sample
240906-cefzqszell
-
MD5
ee42283ee642860f25d8e20a5717882b
-
SHA1
97b007747754d6018b531106030cb24d6d84fa87
-
SHA256
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e
-
SHA512
fea04ec4d5060bf267b93fd1094b673178d549836071e201b045fd072af1c55c91c53d997810b4294d36bc59a00fa3eea662edf10c13fb96b40652028f0fa7f9
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8abk23dVMfy:eTvC/MTQYxsWR7ablo
Static task
static1
Behavioral task
behavioral1
Sample
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.viertechindonesia.com - Port:
587 - Username:
[email protected] - Password:
viertechga46
Targets
-
-
Target
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe
-
Size
1.1MB
-
MD5
ee42283ee642860f25d8e20a5717882b
-
SHA1
97b007747754d6018b531106030cb24d6d84fa87
-
SHA256
f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e
-
SHA512
fea04ec4d5060bf267b93fd1094b673178d549836071e201b045fd072af1c55c91c53d997810b4294d36bc59a00fa3eea662edf10c13fb96b40652028f0fa7f9
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8abk23dVMfy:eTvC/MTQYxsWR7ablo
Score10/10-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-