General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exe
-
Size
206KB
-
Sample
241009-t1wqraygjj
-
MD5
ee6b384c6e586e89dde5d50ecf9a2d6f
-
SHA1
dc02b8f12a36dd0dddefeeb1309c31087cdaa9ff
-
SHA256
8e627235423e16db6f6686775f30e07eb8e2ae1c7c8db9a7bd49083c8cb7f7e1
-
SHA512
fad7441920e67cd4f9e002ae58113f97b9963b3f44f33378d2e8c99eeb5a79a9bb3a51d5279c5ab36ee3717eeb3174ae7a9b67217b28fca37354b4ec26951dd3
-
SSDEEP
3072:zAKnjNnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/oPYm21KLbDoU1s9:zDstvLGtELbMUTKZD
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bisttro.shop - Port:
587 - Username:
[email protected] - Password:
W79cDo2h05Iv - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exe
-
Size
206KB
-
MD5
ee6b384c6e586e89dde5d50ecf9a2d6f
-
SHA1
dc02b8f12a36dd0dddefeeb1309c31087cdaa9ff
-
SHA256
8e627235423e16db6f6686775f30e07eb8e2ae1c7c8db9a7bd49083c8cb7f7e1
-
SHA512
fad7441920e67cd4f9e002ae58113f97b9963b3f44f33378d2e8c99eeb5a79a9bb3a51d5279c5ab36ee3717eeb3174ae7a9b67217b28fca37354b4ec26951dd3
-
SSDEEP
3072:zAKnjNnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/oPYm21KLbDoU1s9:zDstvLGtELbMUTKZD
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-