General
-
Target
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8
-
Size
1.1MB
-
Sample
240920-zfmv1axala
-
MD5
a89a0e42fc2e1f33abf93e44cad2073b
-
SHA1
a64345371fe0ad2c6885087329f5cf5a98af189a
-
SHA256
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8
-
SHA512
92e2979fa352488e8fae7b9ba650656d6af3c220ee3199c93163e6b15c249cbe9db1cfb1331698b47705412ec7dc91e6c92cab47a7428a14c7592336f5cd1961
-
SSDEEP
24576:oQDZIaJExFtl+ZLbcsR9Y4dOPAGFoCKNTlkejfrg4SVQGSakmJ:oQDZvJE7t4I29JuAGFoC0RkejfMcGSaH
Static task
static1
Behavioral task
behavioral1
Sample
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bisttro.shop - Port:
587 - Username:
[email protected] - Password:
XSgWVCcKUruF - Email To:
[email protected]
Targets
-
-
Target
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8
-
Size
1.1MB
-
MD5
a89a0e42fc2e1f33abf93e44cad2073b
-
SHA1
a64345371fe0ad2c6885087329f5cf5a98af189a
-
SHA256
6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8
-
SHA512
92e2979fa352488e8fae7b9ba650656d6af3c220ee3199c93163e6b15c249cbe9db1cfb1331698b47705412ec7dc91e6c92cab47a7428a14c7592336f5cd1961
-
SSDEEP
24576:oQDZIaJExFtl+ZLbcsR9Y4dOPAGFoCKNTlkejfrg4SVQGSakmJ:oQDZvJE7t4I29JuAGFoC0RkejfMcGSaH
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-