General
-
Target
FACTURA_240001920.zip
-
Size
519KB
-
Sample
241115-kwmgva1ldt
-
MD5
f1fc58a97fc3f2502b7cdd0d046ecf81
-
SHA1
02c028d780a63ccdd20b68cef08b6fa045cda1e3
-
SHA256
ca5a0e2963dc959524712f6d71b937d20a2bf15a4fece708ede9a84b50bb2ebf
-
SHA512
cd5ac2f3c35672aacd2916b2619099b32977c51263791c8e36f120ab69f3d9f4d79ba042377b046fc0e6466c48d29fd809566360086f8585cc726f1b4f40948d
-
SSDEEP
12288:ATnVHUif59VXBKLDCyNJV3g3p5EpwdOyPC:AFP5rBKHy51x6
Static task
static1
Behavioral task
behavioral1
Sample
document.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
document.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.tumteks.com - Port:
587 - Username:
[email protected] - Password:
Tt36556300Ss. - Email To:
[email protected]
Targets
-
-
Target
document.exe
-
Size
548KB
-
MD5
682e0e22ac2f06d26d24cac1769e1b80
-
SHA1
1302dd34b80e32415baacafecdfe31d61d0dd563
-
SHA256
51d366ab87eb5988f96d068d503d21b801b5df4535b8851364e56cbacb8fab82
-
SHA512
083c2225192987117d84bbbdbca228937f570fe31ca90aaff3a8cf6b4c1822a1b39523424723bc596056823c338cd7db193777b36487cf732bb526176935daa2
-
SSDEEP
12288:/BvLTWCL5Bj6NdVFB2dDG8DLh3g1prEPwdOC18:RhTmNFB2f2bJfG
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-