General
-
Target
IMG_50026_1780.exe
-
Size
2.6MB
-
Sample
241004-kpvjwayfqf
-
MD5
4c0c7c80a3403fbeff4a66dad379cfd1
-
SHA1
f303e2596c751322499c718b8f53972a7bd7fe9a
-
SHA256
487a34ecebed99d0935c56f644325c884bc1fac51e14c9e4b81970a5a785ed48
-
SHA512
ac768521c41e38d7b314e1a579b4de997e0d98e6268aca98133eb0566e73734b3cfe72f17492110222acb54f7873ee5f6f42a77e89a3d6812989ee14e29392eb
-
SSDEEP
49152:bAA9nB0mUgYd/5xPn9OHkkWmBfdsS0Vstb:x0mUgexP9kkVm9b
Static task
static1
Behavioral task
behavioral1
Sample
IMG_50026_1780.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IMG_50026_1780.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bisttro.shop - Port:
587 - Username:
[email protected] - Password:
W79cDo2h05Iv - Email To:
[email protected]
Targets
-
-
Target
IMG_50026_1780.exe
-
Size
2.6MB
-
MD5
4c0c7c80a3403fbeff4a66dad379cfd1
-
SHA1
f303e2596c751322499c718b8f53972a7bd7fe9a
-
SHA256
487a34ecebed99d0935c56f644325c884bc1fac51e14c9e4b81970a5a785ed48
-
SHA512
ac768521c41e38d7b314e1a579b4de997e0d98e6268aca98133eb0566e73734b3cfe72f17492110222acb54f7873ee5f6f42a77e89a3d6812989ee14e29392eb
-
SSDEEP
49152:bAA9nB0mUgYd/5xPn9OHkkWmBfdsS0Vstb:x0mUgexP9kkVm9b
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-