General
-
Target
5a48f0bb8f074090d925bcb6c813ad70N.exe
-
Size
79KB
-
Sample
240907-flratswckk
-
MD5
5a48f0bb8f074090d925bcb6c813ad70
-
SHA1
976d1d14f50d42da98e46214b83c3097b4d1c3af
-
SHA256
76997337c3512eb4b47cc476e22dc1d0cd861ae58e02cceadeabda61ff4fe2a8
-
SHA512
6f95d8c4ddbc8ebcbc1f45904e4e132e71c9b045e8aa5ef4673229cc9888274e63bfe1482b7fb9db152497adafeca100a4e04694aa59a1b5efe0d0bb751b943f
-
SSDEEP
1536:z3NcR35tQ9VuUyvP6kGtREk+dONComoiJ//me:zNcztbHP6DtRWeCRom//B
Static task
static1
Behavioral task
behavioral1
Sample
5a48f0bb8f074090d925bcb6c813ad70N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a48f0bb8f074090d925bcb6c813ad70N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
juguly.shop - Port:
587 - Username:
[email protected] - Password:
d8GsruZs5Zg6 - Email To:
[email protected]
Targets
-
-
Target
5a48f0bb8f074090d925bcb6c813ad70N.exe
-
Size
79KB
-
MD5
5a48f0bb8f074090d925bcb6c813ad70
-
SHA1
976d1d14f50d42da98e46214b83c3097b4d1c3af
-
SHA256
76997337c3512eb4b47cc476e22dc1d0cd861ae58e02cceadeabda61ff4fe2a8
-
SHA512
6f95d8c4ddbc8ebcbc1f45904e4e132e71c9b045e8aa5ef4673229cc9888274e63bfe1482b7fb9db152497adafeca100a4e04694aa59a1b5efe0d0bb751b943f
-
SSDEEP
1536:z3NcR35tQ9VuUyvP6kGtREk+dONComoiJ//me:zNcztbHP6DtRWeCRom//B
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-