General
-
Target
16012025_0103_15012025_Vessel particulars.zip
-
Size
300KB
-
Sample
250116-beldsatkbz
-
MD5
4a7be7f41db125dbd1105896989c78ee
-
SHA1
2c493ba08489461776fca30277e06ae2b028699a
-
SHA256
8486657f43e4a772dd2897bf5518f792ce415953315105041cba5fd0f29c974d
-
SHA512
3048da5124168a1179e2961a90f5026bda616fc38e78d8eb6a78e8b8afa65a2c20cd2023d137b832831617812133871508a01b33a6cc3bd42b91c3064f5677de
-
SSDEEP
6144:0woVkO+hHXtSTeKZt7FOOSeqtRwP0oik7wrdKnf7O00b2:0wu+hH0Teat71PqtRwqIwpKnfV0b2
Static task
static1
Behavioral task
behavioral1
Sample
Vessel particulars.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Vessel particulars.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
yulifertilizer.com.my - Port:
25 - Username:
[email protected] - Password:
Ayfc931319* - Email To:
[email protected]
Targets
-
-
Target
Vessel particulars.exe
-
Size
577KB
-
MD5
0fdbcbb3889319d8ce5951f8e6fd44b9
-
SHA1
80580f39f716672c6f153449148607d48e323c17
-
SHA256
c6c831bce42aaeb26dc18e8c54b3b101ece31a3dccd0ce563bb538602edc9c32
-
SHA512
c6eb85409f0638051ce07ba119b645b79781af9b7a6f682df17d0f69788fd2a5f0a98b126ca76c57bcb5996333a042c31b0f83a288d7fa983f7f34ff85d98b2a
-
SSDEEP
6144:ZbRKjP7nVEP1ACMeFAKtgRH1YyyQ3izJ5vSPdfpkzk6cjfn4k1LzVFRfGcUPgf3H:ZbRKjP7nep7FQrlsgdfpkfcvfGXPg/
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-