General
-
Target
13639cd4d36be79a9f7df29a82e3c70893fcefea19be10988b990430d27a9c74
-
Size
598KB
-
Sample
240911-tg9hhazeld
-
MD5
3c06569acefd4cf9c0496ed3e018101c
-
SHA1
e819017c32806cc401c428c297494cf7914c4bfa
-
SHA256
13639cd4d36be79a9f7df29a82e3c70893fcefea19be10988b990430d27a9c74
-
SHA512
335ece6ef62d21d199dcc8d9496e0d977184f1103fd4960305485d97641a6da5f713d91c534a1fc4343a9797a95a88b6ede62be50ceaf34fb7c95805c8991d92
-
SSDEEP
12288:M4pf2kfwXUGrOFlxUFHRaLAodo4nqg99jhaJicymiq5GYGLCcWfQRX6HQYarJ:MYflfReOFlxuxyWFg99taJicWqaWq6oJ
Static task
static1
Behavioral task
behavioral1
Sample
Confirmacin de cuenta.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Confirmacin de cuenta.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.skagenships.com - Port:
587 - Username:
[email protected] - Password:
XAqEAz@4
Targets
-
-
Target
Confirmacin de cuenta.pdf.exe
-
Size
1.0MB
-
MD5
314f72c3dfcb5075b2311ff757a79e94
-
SHA1
7b9db33098e5a14ca958224bb68ccc7ed6449727
-
SHA256
22858e8bcefe8c6d4099ee3a798758815b8f398c7c19c0be6156abec597c49a3
-
SHA512
60d93f9c471797c608ca55d1d992efe43962fbe341786bb67aac856f1716c0249eec7c416542a2cc565ea967591bb012e7e16b510c1b333bfa360df883432ad4
-
SSDEEP
24576:i4lavt0LkLL9IMixoEgeazDWU6UNq9MmCS:Vkwkn9IMHeazdaPCS
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-