General
-
Target
10092024171909092024PayrollListDoc.rar
-
Size
20KB
-
Sample
240910-xgr51ayhjk
-
MD5
0987ba5afbd453765939a96df2011f39
-
SHA1
4093495f387a3d6486c9c51ce4fe06cd75a0c007
-
SHA256
5e22e8ff03805bed3d12c363d281f306ed0e4902d8a6fc1770c9fda85af8cd14
-
SHA512
417722d33866d0973043d8a96d9b1aaf4923ea6cb188b207cc7bc8db2b18b7e3221c8a5d0b5e1bc2968b62e3fe052b04fceacac185a58cb87ba920168ded35c9
-
SSDEEP
384:YOFK452r+T5p97mYCdI816LRb55NUaBEKFsCEfjNbnDISIs6/RKFeqDH+l+5:Yw352ypBmYxt9K3KyCEfhbkS6/clQm
Static task
static1
Behavioral task
behavioral1
Sample
inquiry#1523.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
inquiry#1523.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
jertcot.shop - Port:
587 - Username:
[email protected] - Password:
OxMHQMpgDVzU - Email To:
[email protected]
Targets
-
-
Target
inquiry#1523.exe
-
Size
82KB
-
MD5
af2b325becf3f12462529b961699557a
-
SHA1
88da506a656c9ba9615e4134234084bd5c6c086f
-
SHA256
365b8dab76c07e3c7ea3cd4a9d683265db5210b6b9a30e9dc520f358b829d30d
-
SHA512
114e5bae2cf466ae6d7ace9728cac19e738dd5aa532df07b082d42fab22b7a2f286a606a6c476d4cbbea6c8f14804e300ca0e76d634e75ba22c0a8fecc6dad96
-
SSDEEP
768:v632KhVO49eYJBvmCcQw5cEpYinAMxEP:ymKP9JBvmnQG17HxE
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-