General
-
Target
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe
-
Size
1.3MB
-
Sample
250122-cp839sspf1
-
MD5
9dac35c40e2d920ca69f23ba735da601
-
SHA1
122f12f3cb93b5476bbe3140e3eb6bbe2dfdd5db
-
SHA256
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb
-
SHA512
559a65eefaff3399fd424cef1542d5720bed6a054edf5d2a7da66e397dae60aed5c8bc2e592313a01095fd303ec11b3dc05f10a5ac025bb137e7767341aa110d
-
SSDEEP
24576:cSexfdreGMUzwpFOeSX2Pe3iDcZ/rG9dT5v/Phd:ZRGhuFOeSX2C9G9v/Ph
Static task
static1
Behavioral task
behavioral1
Sample
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.omzpnomatik.net - Port:
587 - Username:
[email protected] - Password:
Mustafa2023x
Targets
-
-
Target
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe
-
Size
1.3MB
-
MD5
9dac35c40e2d920ca69f23ba735da601
-
SHA1
122f12f3cb93b5476bbe3140e3eb6bbe2dfdd5db
-
SHA256
21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb
-
SHA512
559a65eefaff3399fd424cef1542d5720bed6a054edf5d2a7da66e397dae60aed5c8bc2e592313a01095fd303ec11b3dc05f10a5ac025bb137e7767341aa110d
-
SSDEEP
24576:cSexfdreGMUzwpFOeSX2Pe3iDcZ/rG9dT5v/Phd:ZRGhuFOeSX2C9G9v/Ph
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-