General
-
Target
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34
-
Size
44KB
-
Sample
241210-k9m1jaskgv
-
MD5
0f23bec7c187b4832c7c09d26db3682e
-
SHA1
7c18cd3954e000af3ea56e5409a4298ab33e9704
-
SHA256
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34
-
SHA512
08877ec2643d600ee38f9653d94c435f3877e0ea179d0f8aa679c3f3d2bfa3346b6129b0bb45cdededf427808f1ac1b4308ad2addd8917eca75d4b88547fb82b
-
SSDEEP
192:w0u3TOyh7otbCKzp9ocJ6WMKhOJRTnkwZiRvzhQmMCJnmJVt:c3bUsALplOJqwIRv9QDymJV
Static task
static1
Behavioral task
behavioral1
Sample
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtps.aruba.it - Port:
465 - Username:
[email protected] - Password:
tecninf2017 - Email To:
[email protected]
Targets
-
-
Target
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34
-
Size
44KB
-
MD5
0f23bec7c187b4832c7c09d26db3682e
-
SHA1
7c18cd3954e000af3ea56e5409a4298ab33e9704
-
SHA256
bcb0065a918da4e789365e7a5800b36a625763421f18ac1dd6067c8e2a419b34
-
SHA512
08877ec2643d600ee38f9653d94c435f3877e0ea179d0f8aa679c3f3d2bfa3346b6129b0bb45cdededf427808f1ac1b4308ad2addd8917eca75d4b88547fb82b
-
SSDEEP
192:w0u3TOyh7otbCKzp9ocJ6WMKhOJRTnkwZiRvzhQmMCJnmJVt:c3bUsALplOJqwIRv9QDymJV
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-