General
-
Target
6_stage4exe.zip
-
Size
45KB
-
Sample
241214-s9de4awrfy
-
MD5
650e71f1384ee29fd33e354de1abed65
-
SHA1
4bcd282b3700caf4b7a8533f4fdcc26e81d6322e
-
SHA256
577c27620d9d8988a19a7829103c3ea9dd699d6dd054de17e5b0adc196ee5061
-
SHA512
dc5ac1b88ff356f606f76921946e78fd1fe7597f86455e05dc56822fc3e1dd49fc8bf47c1d000f10445b07f60bb89fff6b8139231d06d18380fb7235c8cf9093
-
SSDEEP
768:bJQpTyuq+xF51363cdLZDau2yG6MuwuSRNcwtFJz+z7GaMKdcqzHx0/d7GTL4h2s:iTyGxX1CcZMQMuwuUt+zTbW9GTpVZbTI
Behavioral task
behavioral1
Sample
lfwhUWZlmFnGhDYPudAJ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
lfwhUWZlmFnGhDYPudAJ.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
UWzDeXWsD8
Targets
-
-
Target
lfwhUWZlmFnGhDYPudAJ.bin
-
Size
127KB
-
MD5
bdef67c31299a3d0c10e3608c7ee2bdb
-
SHA1
86be2a34eacbc0806dbd61d41b9d83a65aef69c5
-
SHA256
ec3023ecf592a4f637e7c99b009466aa38ba90b9f9c7fbb550f129bca285bd6e
-
SHA512
2fa7511db9ef8189e64f240adb7ba0429cbfdb4f2eaa08e5c8375272af3b2a9a4ee3a4a03c7dec4cfc4525ad1212af39dcbe07af614cd66a9de28c3239562c78
-
SSDEEP
3072:GjdK8z5ULywYru5eJxqMnb7x3AhwfBINdgbY:StUCueJxnnbxAlN+b
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-