General
-
Target
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6.exe
-
Size
807KB
-
Sample
250113-m3dvdssjfr
-
MD5
fee3c4b6611105b43993848c321a876a
-
SHA1
9cb471805bb2679bcd0cfc794f8301e86e2bacfc
-
SHA256
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6
-
SHA512
6d8d16d89cd0c22a8c402e7ac378bd1a41b4c117f52f521c674d89b1fb0d064eaaa757fa2db3765ca97c412c7954438d08d32be75f5fe53677f3c3dde8b9becf
-
SSDEEP
24576:5MaSSKy2/SPNc0PrH5yj15ALOF+gGQ5p/i+:5RQ5s/gtN
Static task
static1
Behavioral task
behavioral1
Sample
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.yulifertilizer.com.my - Port:
25 - Username:
[email protected] - Password:
Ayfc931319* - Email To:
[email protected]
Targets
-
-
Target
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6.exe
-
Size
807KB
-
MD5
fee3c4b6611105b43993848c321a876a
-
SHA1
9cb471805bb2679bcd0cfc794f8301e86e2bacfc
-
SHA256
5bf0cf3d590605a0f8aeef0cb6bbf2520905e8ebd48682c7c5cdd5f55286a8a6
-
SHA512
6d8d16d89cd0c22a8c402e7ac378bd1a41b4c117f52f521c674d89b1fb0d064eaaa757fa2db3765ca97c412c7954438d08d32be75f5fe53677f3c3dde8b9becf
-
SSDEEP
24576:5MaSSKy2/SPNc0PrH5yj15ALOF+gGQ5p/i+:5RQ5s/gtN
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-