General
-
Target
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe
-
Size
244KB
-
Sample
241123-yg969azjdk
-
MD5
5b9067516c6af0b47434bfbd4796504a
-
SHA1
ebb265c4582e263edcb43954a1bc4752d955d475
-
SHA256
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7
-
SHA512
2ed40c3687d69817efa418f39ea408d9195531b5d8b9875e5bde569f5e941b0c17b4e83b2186b84f46b159d50b5f1559f7c94279b0a17695f694eeeca57f0776
-
SSDEEP
6144:ngbDaX+pQ7uDe2bQD3g+UP/hry30vBEZTJv:nghpleCQD3g+UP/sB1
Static task
static1
Behavioral task
behavioral1
Sample
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.efinancet.shop - Port:
587 - Username:
[email protected] - Password:
EmeN]m^8=-oI - Email To:
[email protected]
Targets
-
-
Target
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe
-
Size
244KB
-
MD5
5b9067516c6af0b47434bfbd4796504a
-
SHA1
ebb265c4582e263edcb43954a1bc4752d955d475
-
SHA256
d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7
-
SHA512
2ed40c3687d69817efa418f39ea408d9195531b5d8b9875e5bde569f5e941b0c17b4e83b2186b84f46b159d50b5f1559f7c94279b0a17695f694eeeca57f0776
-
SSDEEP
6144:ngbDaX+pQ7uDe2bQD3g+UP/hry30vBEZTJv:nghpleCQD3g+UP/sB1
-
Snake Keylogger payload
-
Snakekeylogger family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-