General
-
Target
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe
-
Size
1.2MB
-
Sample
241112-m6wvdatrdr
-
MD5
5e12b8af30ba25592deea2af600acf84
-
SHA1
dbd4874dc2ceaa88ca57f7e9b11bdb6d4616ce0a
-
SHA256
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626
-
SHA512
07562cacaff7c1c8572c17621d7afa77b296615e3b3194ecc9a4932fc73069e4cf9dc632abad032e0a420b3026d609d6c50617f1b5020d78e20777674e984f80
-
SSDEEP
6144:qQEnLie8O3JkyEPtCS/0imMPIAcaei7z4XYm/phOfJI5+GRSTneGRpr0wQGCztNd:qNie8EOyEP3/dAADrziYmxR5bdwDkNd
Static task
static1
Behavioral task
behavioral1
Sample
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.bellstone.in - Port:
25 - Username:
[email protected] - Password:
N % m 22 , . , .2 0 2 10 3
Targets
-
-
Target
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe
-
Size
1.2MB
-
MD5
5e12b8af30ba25592deea2af600acf84
-
SHA1
dbd4874dc2ceaa88ca57f7e9b11bdb6d4616ce0a
-
SHA256
7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626
-
SHA512
07562cacaff7c1c8572c17621d7afa77b296615e3b3194ecc9a4932fc73069e4cf9dc632abad032e0a420b3026d609d6c50617f1b5020d78e20777674e984f80
-
SSDEEP
6144:qQEnLie8O3JkyEPtCS/0imMPIAcaei7z4XYm/phOfJI5+GRSTneGRpr0wQGCztNd:qNie8EOyEP3/dAADrziYmxR5bdwDkNd
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-