General
-
Target
6a245b905c19e22d85a06530f05c0cc369479df8f258f095450d75e4510ef612
-
Size
598KB
-
Sample
240926-p8t5nsyblm
-
MD5
0d7da8c55e2245f1484908be0381ce5a
-
SHA1
d2eb542b4b644dc264f866f9c3794663d64da99d
-
SHA256
6a245b905c19e22d85a06530f05c0cc369479df8f258f095450d75e4510ef612
-
SHA512
66ea9a979ab7a966ef047f55b43e9fe14c6cc2f284b916cfac9c587b8728a07bd815b8fddacc04726e1f3ee4143f0f98d559ee22cfdb2767adb2e7f0864a02ee
-
SSDEEP
12288:YHWZ2ysM9RZ1/uXIp3727sbuCqve55x08YtU9FUdv5ZTOBEM:Y2ZIMzZ9uY50sbLqUzae9FUdvLI
Static task
static1
Behavioral task
behavioral1
Sample
SPARE PARTS 3726 lbs1691 Kgs.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SPARE PARTS 3726 lbs1691 Kgs.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.al-subai.com - Port:
587 - Username:
[email protected] - Password:
A_Sadek1962 - Email To:
[email protected]
Targets
-
-
Target
SPARE PARTS 3726 lbs1691 Kgs.exe
-
Size
950KB
-
MD5
33f4f9f62704cd365522a3b9554c3feb
-
SHA1
015363f84320d84a4047390ddc25657815326c1f
-
SHA256
6f6a020c25a3ecfe475e9b86cc1aaed8092b6d23a4886d36944af7c622914f37
-
SHA512
c739dc900fdb65f1bbecab17642382d58679a7ae36ca5cc4fbbbdd3a2e4563ed452633b6aad6585f666bf56f279e4da0703ec8b05093378756e6665965e30931
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCPPGBl2GqanwPnG0xHt:7JZoQrbTFZY1iaCPPc2GFnC
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-