General
-
Target
e1bc68f654672190e29c66dd669c5a84ada74179ba831f7cbe1c5005b6d9e399.img
-
Size
90KB
-
Sample
250103-e98z4szlez
-
MD5
47ea738be27c3f0886b29f2928ecda32
-
SHA1
9e95d9b748cbe907a71e7bff6d8d7e69d68aad8f
-
SHA256
e1bc68f654672190e29c66dd669c5a84ada74179ba831f7cbe1c5005b6d9e399
-
SHA512
c295c192b88739d758953e3495186dcfdb7830f317082d94f0f29c2b93a0c2316f97ccd3a6bd5a710b8e54b0b07fba719ed076f706d6107bcdfcd5ef259af39d
-
SSDEEP
384:XP6CrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5/:Xt7wn9Dy8PPnyd5GuYxDF94R
Static task
static1
Behavioral task
behavioral1
Sample
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtps.aruba.it - Port:
465 - Username:
[email protected] - Password:
tecninf2017 - Email To:
[email protected]
Targets
-
-
Target
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
-
Size
29KB
-
MD5
eb6a1705873b7a3a9bea8074f4e4d69a
-
SHA1
4033b84b870606916c4ad67df1080f9b3757d118
-
SHA256
035fd9019348ef838afdb9663b147828c3523347699551e03ac73f8da3d3e8b9
-
SHA512
e1f760ff0dd26884dfcc368e0f1c5a341df4bbbda1955f8519d669904e1efe4195985c410fda24c214676b70bcabb6fe81cad5e95b8ed246ca4a13680700bd98
-
SSDEEP
384:VCrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5P7T:U7wn9Dy8PPnyd5GuYxDF94R
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-