General
-
Target
Wire_01987012.exe
-
Size
964KB
-
Sample
240924-hx8qcsverk
-
MD5
ddf895aac213b394e4bf8be023f68dcd
-
SHA1
826ce15cfa6857adf191540b2b843fa97aa4cce0
-
SHA256
eb7b6182f2f6ccd5b150c810e5eaf94b7e22a638e6968e566d96f8f5f1ed85b1
-
SHA512
399bb4ecd0e3aee265eca048ee3a530edfb48948d46e6e5d11f9b93696d79e36d72d44d72c9d526b8d552af66cfe98dd48291b047ee0bfc1136f7c0113027889
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCPE8hz/isTvzvrwCuhlA0:uRmJkcoQricOIQxiZY1iaCTLbvkRH+Na
Static task
static1
Behavioral task
behavioral1
Sample
Wire_01987012.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wire_01987012.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pakcentar.ba - Port:
587 - Username:
[email protected] - Password:
Almir.KardasPC!18_ - Email To:
[email protected]
Targets
-
-
Target
Wire_01987012.exe
-
Size
964KB
-
MD5
ddf895aac213b394e4bf8be023f68dcd
-
SHA1
826ce15cfa6857adf191540b2b843fa97aa4cce0
-
SHA256
eb7b6182f2f6ccd5b150c810e5eaf94b7e22a638e6968e566d96f8f5f1ed85b1
-
SHA512
399bb4ecd0e3aee265eca048ee3a530edfb48948d46e6e5d11f9b93696d79e36d72d44d72c9d526b8d552af66cfe98dd48291b047ee0bfc1136f7c0113027889
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCPE8hz/isTvzvrwCuhlA0:uRmJkcoQricOIQxiZY1iaCTLbvkRH+Na
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-