General
-
Target
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756
-
Size
100.0MB
-
Sample
240909-npme2sxhlg
-
MD5
744720a3be6bbd237c8fe1e119d04638
-
SHA1
7182439de1107effdc51f7ae73c44588e6a90970
-
SHA256
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756
-
SHA512
1ab6fc386397b83feba691d758df03583c6ca1b3b3570929b988738b11d1c454e562874095f4f740352cbe4def554a942fa5b61b6f274b54f08e2a3171f4e548
-
SSDEEP
24576:oAHnh+eWsN3skA4RV1Hom2KXMmHa2kIXhDnPa5:vh+ZkldoPK8Ya2kahDn4
Static task
static1
Behavioral task
behavioral1
Sample
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.optec.com.ec - Port:
587 - Username:
[email protected] - Password:
9A0hmRgU~OhG - Email To:
[email protected]
Targets
-
-
Target
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756
-
Size
100.0MB
-
MD5
744720a3be6bbd237c8fe1e119d04638
-
SHA1
7182439de1107effdc51f7ae73c44588e6a90970
-
SHA256
e11532b77bec09e8a74fa02135de0a9e00adfc73956027e436eb7954c5548756
-
SHA512
1ab6fc386397b83feba691d758df03583c6ca1b3b3570929b988738b11d1c454e562874095f4f740352cbe4def554a942fa5b61b6f274b54f08e2a3171f4e548
-
SSDEEP
24576:oAHnh+eWsN3skA4RV1Hom2KXMmHa2kIXhDnPa5:vh+ZkldoPK8Ya2kahDn4
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-