General
-
Target
20012025_1552_20012025_LETTER OF AUTHORIZATION.zip
-
Size
604KB
-
Sample
250120-ta7qbsxkbj
-
MD5
d76d2911f884df8dab209a9e399bccf6
-
SHA1
7dbf3c8e920e9f532d69d467f5563b756cf773dc
-
SHA256
fe6402cb56844ea02e9d99b45ec657bf4716b5d61fa057894f811e665366571d
-
SHA512
063a4e6203a95686381c419985317ada14b5fcc3532746e63b2d9281bafff1f246af9d42468faf079cc5c9d73a9d0cc6fd7db57ad67cf76a99cd9932f17a1a45
-
SSDEEP
12288:ZWqCIW3Ll4g/ozVp0LqkOplsk+xL9rOLmJaeBym2AWyaKCWzah8q8kfHXu:ZTCIa4g/owOHsVxZOAWyyWMFDPe
Static task
static1
Behavioral task
behavioral1
Sample
LETTER OF AUTHORIZATION.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LETTER OF AUTHORIZATION.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
yulifertilizer.com.my - Port:
25 - Username:
[email protected] - Password:
Ayfc931319* - Email To:
[email protected]
Targets
-
-
Target
LETTER OF AUTHORIZATION.exe
-
Size
1.2MB
-
MD5
c787d6c746ed6c0d08e0d7ce05012b56
-
SHA1
614d8f36a2016bfa67472876383f9ab2ae55fe48
-
SHA256
6ed8984ec6982853a97d73d735054cb897d4acea75e284b9a5493086917206e7
-
SHA512
de60d9babe7bf3b7f0e729bb02ac7a7536b7b17b7ca869a34c07571535fa551e10a20f43de79f563cdb84c32ff3119e2c258157e133924c74f27c284cf3dc2a1
-
SSDEEP
24576:7Sexfdr7yJ96EbKNxpXq7TYA2rQtlHPI4Q:mNIEbKzVQB
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-