General
-
Target
47ea738be27c3f0886b29f2928ecda32.bin
-
Size
15KB
-
Sample
250104-bllm5awjbl
-
MD5
df6fd124cf53085f6afd55145eaaaa89
-
SHA1
2635117ce8b49f3dd0db6efc092ca9386df8acca
-
SHA256
e5bddb1a43b3ab059609efed7b33d8bc92170c5b266ffef060a6323b43d4d588
-
SHA512
a85d1afee6db3e6c91d8e8f042a599700b5d27ad745ef94ae3261585cd258864579b17587ce27fc4a0ff72ae89888c611a011ce9f268521d22cb3b47ed3313c9
-
SSDEEP
384:hQ4f34E9+cyD3BmwsF6GZHjFwR5mGHoR7+CYlTcjB/wW:64fTYcylmwsFRj0m2o9+J4z
Static task
static1
Behavioral task
behavioral1
Sample
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtps.aruba.it - Port:
465 - Username:
[email protected] - Password:
tecninf2017 - Email To:
[email protected]
Targets
-
-
Target
HBL - 446222025 Vapor MAERSK BOGOR448S.exe
-
Size
29KB
-
MD5
eb6a1705873b7a3a9bea8074f4e4d69a
-
SHA1
4033b84b870606916c4ad67df1080f9b3757d118
-
SHA256
035fd9019348ef838afdb9663b147828c3523347699551e03ac73f8da3d3e8b9
-
SHA512
e1f760ff0dd26884dfcc368e0f1c5a341df4bbbda1955f8519d669904e1efe4195985c410fda24c214676b70bcabb6fe81cad5e95b8ed246ca4a13680700bd98
-
SSDEEP
384:VCrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5P7T:U7wn9Dy8PPnyd5GuYxDF94R
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-