General
-
Target
SK09876.exe
-
Size
616KB
-
Sample
250117-nplthswnbl
-
MD5
eeec5bbe187667b25e6b6b8e68d4dcce
-
SHA1
12150c63ad276e94e3270ce3169c1afce22534f2
-
SHA256
14e06136df7cb1d702865305be8e50343153003f1faf2fd55d85480abc14354d
-
SHA512
9f65522b95e38c15a6cfb545a0b617b6fc123ae4800ad57c2e65e92eeaf3a3ef1c1df339d4716f0a41310f0600c3c1b81bf30f101550aabb21ff1eca4e133454
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLx8HgCKxYWFJ/MIGcEDhL53TleNU9AFbmdyh:tthEVaPqLx8HgCKd7mlDhNUNUKJjh
Behavioral task
behavioral1
Sample
SK09876.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SK09876.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.daipro.com.mx - Port:
587 - Username:
[email protected] - Password:
DAIpro123** - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
SK09876.exe
-
Size
616KB
-
MD5
eeec5bbe187667b25e6b6b8e68d4dcce
-
SHA1
12150c63ad276e94e3270ce3169c1afce22534f2
-
SHA256
14e06136df7cb1d702865305be8e50343153003f1faf2fd55d85480abc14354d
-
SHA512
9f65522b95e38c15a6cfb545a0b617b6fc123ae4800ad57c2e65e92eeaf3a3ef1c1df339d4716f0a41310f0600c3c1b81bf30f101550aabb21ff1eca4e133454
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLx8HgCKxYWFJ/MIGcEDhL53TleNU9AFbmdyh:tthEVaPqLx8HgCKd7mlDhNUNUKJjh
-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-