General
-
Target
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe
-
Size
1.0MB
-
Sample
240914-b6eejszhpn
-
MD5
6b8ffeb500dd8a10b3a3f437efb9714c
-
SHA1
0bf183baf160e6753b38ce48f2ae8b8cf32653d0
-
SHA256
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14
-
SHA512
998ffbf313d2c4d20bfac39eb69427e19c795b72a199b430a3db2b5834dac935be3e9627adc4e607ade531c5ebfbf9d39d4fba7a63b42f53ba69d9f339eaa2b3
-
SSDEEP
24576:1tb20pkaCqT5TBWgNQ7a9depk/7diNU36A:mVg5tQ7a9482G5
Static task
static1
Behavioral task
behavioral1
Sample
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.luhomar.com.co - Port:
587 - Username:
[email protected] - Password:
z9-ziS7,lbO@ - Email To:
[email protected]
Targets
-
-
Target
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe
-
Size
1.0MB
-
MD5
6b8ffeb500dd8a10b3a3f437efb9714c
-
SHA1
0bf183baf160e6753b38ce48f2ae8b8cf32653d0
-
SHA256
a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14
-
SHA512
998ffbf313d2c4d20bfac39eb69427e19c795b72a199b430a3db2b5834dac935be3e9627adc4e607ade531c5ebfbf9d39d4fba7a63b42f53ba69d9f339eaa2b3
-
SSDEEP
24576:1tb20pkaCqT5TBWgNQ7a9depk/7diNU36A:mVg5tQ7a9482G5
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-