General
-
Target
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995
-
Size
762KB
-
Sample
241116-y3wwratalg
-
MD5
4398a15085a3837ef2ef6a7b056643c6
-
SHA1
d15e71d5e8e9b750d429c7602d98e7203c24543b
-
SHA256
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995
-
SHA512
34b5b0b7299c325a525675c8a0cc9e4cd6ce724866530bba7933c783c87d73f477297e8d865af6836926e5cf579292f4ce385f2c2c8ce89f916199d048a8dafe
-
SSDEEP
12288:8PG/hGy3E/kipG6IhwYz0BWIbyuwQL3OWntl81tTTZ/Oi5DwFyEionDud:QGhbYpGjhwYzO5yRQLvf81BV2m6ionDE
Static task
static1
Behavioral task
behavioral1
Sample
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Citicorp.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Citicorp.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.securemail.pro - Port:
587 - Username:
[email protected] - Password:
jrpM0Y5k - Email To:
[email protected]
Targets
-
-
Target
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995
-
Size
762KB
-
MD5
4398a15085a3837ef2ef6a7b056643c6
-
SHA1
d15e71d5e8e9b750d429c7602d98e7203c24543b
-
SHA256
eeb19ccec86a82f4ebbe4512ebadca5089bc192478a356a99824a89b1f122995
-
SHA512
34b5b0b7299c325a525675c8a0cc9e4cd6ce724866530bba7933c783c87d73f477297e8d865af6836926e5cf579292f4ce385f2c2c8ce89f916199d048a8dafe
-
SSDEEP
12288:8PG/hGy3E/kipG6IhwYz0BWIbyuwQL3OWntl81tTTZ/Oi5DwFyEionDud:QGhbYpGjhwYzO5yRQLvf81BV2m6ionDE
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Citicorp.Amf
-
Size
52KB
-
MD5
50a86de35927f45ce009f37494068b0d
-
SHA1
880c888d5e156d7080395c964614872fe42ac89d
-
SHA256
ff7d67d9d4613f0716febf78a0e813953862c77bb5f084eebf881ac02809984b
-
SHA512
230f60733ee595111e91b0bb9c99a5a4c72b5ebfb1b77ff544b5aadeff5179fccfcd473fa8caa290798d6558f753663d21f966a6db9b2193d15e81adef6159d6
-
SSDEEP
1536:CouBFNxtHIbsZOUwUKo0gwGXjnhDvWZHK1y22IE:MxiGS1o0LGTnhDvUayx
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-