General
-
Target
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc.exe
-
Size
924KB
-
Sample
250110-rfj54swmbw
-
MD5
39fe6aa3bfcf971e363ec7865079fa05
-
SHA1
7f97b49491bcda0402a02d0a1946b0853c507d6e
-
SHA256
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc
-
SHA512
46f3ea719488dc5a847baafb2e581f45845dd0fb902d7bcf50f6d865d1730d14d8d55b481be5f3be0be879766486e500ef5813d86bde7dc230d0dab90d2db40b
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLwlVZGnxitFM+pJiADs/3FzmaE:ffmMv6Ckr7Mny5QLbnHYius1mL
Static task
static1
Behavioral task
behavioral1
Sample
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pakcentar.ba - Port:
587 - Username:
[email protected] - Password:
Almir.KardasPC!18_ - Email To:
[email protected]
Targets
-
-
Target
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc.exe
-
Size
924KB
-
MD5
39fe6aa3bfcf971e363ec7865079fa05
-
SHA1
7f97b49491bcda0402a02d0a1946b0853c507d6e
-
SHA256
a6f6e18a65c1b0247944a3d52d26d7616290ef28c8aba5b48253d125887e83dc
-
SHA512
46f3ea719488dc5a847baafb2e581f45845dd0fb902d7bcf50f6d865d1730d14d8d55b481be5f3be0be879766486e500ef5813d86bde7dc230d0dab90d2db40b
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLwlVZGnxitFM+pJiADs/3FzmaE:ffmMv6Ckr7Mny5QLbnHYius1mL
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-