General
-
Target
bad1.exe
-
Size
40.2MB
-
Sample
250121-12y1tstpgn
-
MD5
3de1b681a7e0bd3ab0eab17397e71d67
-
SHA1
38af65d2a7153862c97f6549be6808263a41d37a
-
SHA256
c4f91a3c477d6c7ff7957ee33d1729d3df95c1903416cdc830c4178fd597c8b1
-
SHA512
68833e4c0c51c98ab5e7b1316653471ff69bdf5b208007b40f8d6b647f193fe84a0b0413e46018fba77b53a2ce327276289cbd21cc54dc28dcb4df31383d5407
-
SSDEEP
393216:q76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfwnVQx4urYsANulL7NO:q0LoCOn+2ws4urYDNulLBiua
Static task
static1
Behavioral task
behavioral1
Sample
bad1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bad1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.daipro.com.mx - Port:
587 - Username:
[email protected] - Password:
DAIpro123** - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
bad1.exe
-
Size
40.2MB
-
MD5
3de1b681a7e0bd3ab0eab17397e71d67
-
SHA1
38af65d2a7153862c97f6549be6808263a41d37a
-
SHA256
c4f91a3c477d6c7ff7957ee33d1729d3df95c1903416cdc830c4178fd597c8b1
-
SHA512
68833e4c0c51c98ab5e7b1316653471ff69bdf5b208007b40f8d6b647f193fe84a0b0413e46018fba77b53a2ce327276289cbd21cc54dc28dcb4df31383d5407
-
SSDEEP
393216:q76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfwnVQx4urYsANulL7NO:q0LoCOn+2ws4urYDNulLBiua
-
Snake Keylogger payload
-
Snakekeylogger family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-