General
-
Target
bd91f4d772bbcd54a8e4aa66fc0a522b24a8a8576481aaa44f66dee04eb76f4b
-
Size
299KB
-
Sample
250116-q4mepstphr
-
MD5
19d89287946c2857046db3f77eacd3b3
-
SHA1
b66894e29204fd323364aa70a08105a3f204a1bc
-
SHA256
bd91f4d772bbcd54a8e4aa66fc0a522b24a8a8576481aaa44f66dee04eb76f4b
-
SHA512
831b4889a6db5be87d05f23a48e58901544229e4e73f9875214d249e743800f3cfb8267a5b41f7acab5a4e0cf932ace2372690be68da72def16e6948171be11e
-
SSDEEP
6144:two3Yk63KoWPkRul/KJ9EAo/V0TVmfOI5gkmP2ooj8E:twzkGp3J9CqTVrIKXoIE
Static task
static1
Behavioral task
behavioral1
Sample
MV ANNA SCHULTE.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MV ANNA SCHULTE.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
webmail.instalacionestasende.com - Port:
25 - Username:
[email protected] - Password:
VzX79@6v - Email To:
[email protected]
Targets
-
-
Target
MV ANNA SCHULTE.exe
-
Size
577KB
-
MD5
69e89ef61b383149a0af933abe41b628
-
SHA1
7e84f30ea43e7f5f4d035693b02983061ba423e0
-
SHA256
65fd3e6981e71f5f189ed8496a037d74c05e41af482d0e9f9e649552866fd13f
-
SHA512
731452336944e68d397f6ed63ab12c14bc85c18bdb715443008527a1b2e2ccdda1f87c0adaff2e52f9c9184b707cd2595c5ada435c8be880c706951e69d4084c
-
SSDEEP
12288:ZbRKjP7neZvHStWDjJe4vroUD04OqTV9lQo1GIrrDQLRXPgt:DKjP7eZMWDjkMNlj15sLo
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-