General
-
Target
44da9de9c46bbfbc4ed8c86636f3d4da290214ae8b389c804d6ceedc0a66cfef
-
Size
326KB
-
Sample
241208-eagrks1las
-
MD5
f8cec31e3822904c1320cd7e2ec3b539
-
SHA1
a68ae92a3f5f736d773eeb851d51c9de9c11b91c
-
SHA256
44da9de9c46bbfbc4ed8c86636f3d4da290214ae8b389c804d6ceedc0a66cfef
-
SHA512
4a9d4693db62f20d8621f0b5c5dc70beb34e2e6642555f891757c4d5f93a8bea8b85d1d8c12e83ac2bfc6a5512527892636a3c255cec2ba7101cbc8cac6d46de
-
SSDEEP
6144:6VFR5eh3eyqXmxRpgQHV8Na6GDqROSf5Jw/9F7RruuCfTZpN2:6HRohMWRvV8vtRJU9F7RrIVC
Static task
static1
Behavioral task
behavioral1
Sample
Shipment details.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipment details.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.gzdled.com.tr - Port:
587 - Username:
[email protected] - Password:
Gozdeled1048 - Email To:
[email protected]
Targets
-
-
Target
Shipment details.exe
-
Size
540KB
-
MD5
c4407cbd68725778ecd99dc7638be000
-
SHA1
0a232725a5857010de9eb61837fe6bbb3a6e151f
-
SHA256
2b8887e80909f776f73b07b6870c4f3f3be8697560e693a4786707d76aae4c01
-
SHA512
4ba0d5c953ce0ee4c984f36360c60fa4212d77633ec24b8bbff91ead5dbbd853272c9c6b4700e0db6865bc6678bd356c039a7623d134ff44068e107b3ad80376
-
SSDEEP
12288:YiU+RfWk1Sm5bpviLs+fMKqirYo4A4OPoTo84RPlA24:Yi3fWxIbZiLsSPWotf
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-