General
-
Target
1bad301dc6bc6e3ebda9398dc725cc09
-
Size
955KB
-
Sample
241014-wxx6hsshpr
-
MD5
1bad301dc6bc6e3ebda9398dc725cc09
-
SHA1
f0bd08347b10015e8fb5b3947ac5ed29c76bf3b0
-
SHA256
b6d1c9c00367ad125a2a658201e70bbe8fb02890e29d1d595e6d1a5755220e99
-
SHA512
e5c833c046d1648dcd53ee6009317940953448d8db6fe086e3c38a4afd299b66b249cb7549f15db30240f5ba95a3fafc4042432197547b92af23c8476f8a6b98
-
SSDEEP
12288:oAMOc+aZoNhChWtbK45UvSmG9D1TAk44idXvR8KahaHR:gZKCebJUamQN4i+R
Static task
static1
Behavioral task
behavioral1
Sample
1bad301dc6bc6e3ebda9398dc725cc09.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1bad301dc6bc6e3ebda9398dc725cc09.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
5555chibuike - Email To:
[email protected]
Targets
-
-
Target
1bad301dc6bc6e3ebda9398dc725cc09
-
Size
955KB
-
MD5
1bad301dc6bc6e3ebda9398dc725cc09
-
SHA1
f0bd08347b10015e8fb5b3947ac5ed29c76bf3b0
-
SHA256
b6d1c9c00367ad125a2a658201e70bbe8fb02890e29d1d595e6d1a5755220e99
-
SHA512
e5c833c046d1648dcd53ee6009317940953448d8db6fe086e3c38a4afd299b66b249cb7549f15db30240f5ba95a3fafc4042432197547b92af23c8476f8a6b98
-
SSDEEP
12288:oAMOc+aZoNhChWtbK45UvSmG9D1TAk44idXvR8KahaHR:gZKCebJUamQN4i+R
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-