General
-
Target
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe
-
Size
70.0MB
-
Sample
240906-hj5fsasanl
-
MD5
1761d1544f193851882c5f59868a1d58
-
SHA1
15a21dc05cc4fbd55afc06d8ccdbd9ef9906c169
-
SHA256
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2
-
SHA512
af35c9b09c1a9c67ccd71ed59c2957559331d9cdd5fdbf12208dfcd852b7624819e9a9fd44e511c82c019b6afaf163dd3f9b4bd1f7a9f865f59db57b6c7174c1
-
SSDEEP
24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aEctGLJ9+wW:5TvC/MTQYxsWR7aEctc9J
Static task
static1
Behavioral task
behavioral1
Sample
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
dot1n2002.servwingu.mx - Port:
587 - Username:
[email protected] - Password:
34(fgj5n]hjE - Email To:
[email protected]
Targets
-
-
Target
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe
-
Size
70.0MB
-
MD5
1761d1544f193851882c5f59868a1d58
-
SHA1
15a21dc05cc4fbd55afc06d8ccdbd9ef9906c169
-
SHA256
19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2
-
SHA512
af35c9b09c1a9c67ccd71ed59c2957559331d9cdd5fdbf12208dfcd852b7624819e9a9fd44e511c82c019b6afaf163dd3f9b4bd1f7a9f865f59db57b6c7174c1
-
SSDEEP
24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aEctGLJ9+wW:5TvC/MTQYxsWR7aEctc9J
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-