General
-
Target
a8b9db65953cde05c576daf4b32b6088a16b33ac96345c2de1b117fb0922134d
-
Size
566KB
-
Sample
241104-w87jbsvdpc
-
MD5
2f6e38bdda06d7dd6a731732294b4756
-
SHA1
da8d4fd1246d593a0c607a1aeefd907961993b18
-
SHA256
a8b9db65953cde05c576daf4b32b6088a16b33ac96345c2de1b117fb0922134d
-
SHA512
7d74f81e9a39778bbefa6173e3935697144794b66a50a3a15f3f6b9478db1166f8ac66feab273a28e2408a05a33c5618d70c84be5a652737ebd4342ba4f2cfa1
-
SSDEEP
12288:z5F2GkxEaWZdsBxjdau35jeT1QN2Yc7h/xJjv+kgXtrUkgHUo/q30cdn:NF2GkxEHmBXau35jeT10cpxdv6u3Hgzp
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Transferencia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.skagenships.com - Port:
587 - Username:
[email protected] - Password:
XAqEAz@4
Targets
-
-
Target
Transferencia.exe
-
Size
664KB
-
MD5
3f6d217364b17266bb888620c490260a
-
SHA1
12aa2706b4b7a7ceca604ef8e440dfa2ba2925b0
-
SHA256
ff5c91650db7948dab64599a77241952f1e81dbd10201418c90a1be3f3ec94f1
-
SHA512
6cc7a8bb4fc0b46778f9a352fdf9e164c730c89a27339a59e1a999efa8bebdf1c265a76e06d9e9bcbcbee02a28145c465071cdd1c5588ccb6cedc58e548a1b82
-
SSDEEP
12288:uM3ZJLcWeC4b3OuFW1D5jkiUr6Vz9hDTl02YCdhNxJpvgyglrh:LnAOuQ5jZUr+jTQCxxXvnIh
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-