General
-
Target
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f.exe
-
Size
946KB
-
Sample
241009-n9q9qsycqd
-
MD5
c57e7476788dd17855eb5909cadaa9cd
-
SHA1
fdc41f6fa4ba1c1d4b8f4ce6a8ec73b8cd2786a6
-
SHA256
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f
-
SHA512
46dd88b799ee1442fcd51a49aba5fbc75cd4377af95c18f4ac9162446c24cf252401c1ccddaf33fe0dd513e92dbbc60898b22f4320d7b20ddb8328806fdb4b38
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCwSp1+mjbTH+1A2eLn:7JZoQrbTFZY1iaCw21+mqAHn
Static task
static1
Behavioral task
behavioral1
Sample
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.invesxteu.info - Port:
587 - Username:
[email protected] - Password:
dN2lI9vN9y
Targets
-
-
Target
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f.exe
-
Size
946KB
-
MD5
c57e7476788dd17855eb5909cadaa9cd
-
SHA1
fdc41f6fa4ba1c1d4b8f4ce6a8ec73b8cd2786a6
-
SHA256
783a680bcbfccc0f96b7a3104a73ad1c18d18c7fe9689894d6c9d86fbeea960f
-
SHA512
46dd88b799ee1442fcd51a49aba5fbc75cd4377af95c18f4ac9162446c24cf252401c1ccddaf33fe0dd513e92dbbc60898b22f4320d7b20ddb8328806fdb4b38
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCwSp1+mjbTH+1A2eLn:7JZoQrbTFZY1iaCw21+mqAHn
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-