General
-
Target
b3d7195fc327935daadc7a6c1bccc3a4f58801a57a08499a0dc0f5f19267ce7e.rar
-
Size
541KB
-
Sample
250130-d1sq4awnhp
-
MD5
40af4320fdc047885f2df46d70dc5d53
-
SHA1
fb765b163fe71b1b794c7c7f47d696d5e441bbdf
-
SHA256
b3d7195fc327935daadc7a6c1bccc3a4f58801a57a08499a0dc0f5f19267ce7e
-
SHA512
d67af9d5d608a63c91eff64b5e50ee6c43b76441336b479a85b9e84db90ad1d2f1f746bd03a2f314fb4663647cc69163486928f03de383ec0d872b50efc4b013
-
SSDEEP
12288:TH01NPjs49RTe0jr7EcNWWvjpu9QJssZe+gwkGbGsq:THqNPjs49RTeWr7ECW9E3IGU
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
swift copy.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.saleo-gomel.by - Port:
587 - Username:
[email protected] - Password:
Q_gidroadmin_2014
Targets
-
-
Target
swift copy.exe
-
Size
746KB
-
MD5
30aa40cfd441ee5808681bd0620c67a1
-
SHA1
53a7d7b52cecd8c11838df6be95450c0eed9fa7d
-
SHA256
565dd0687c5447e3714250520bc29577e6516b8bc597067ca0dff05274896b4e
-
SHA512
9ced91064a9314eebb52300b70dc797b1831867ac67a5bc3d45d85809c071c29852ec1f9e853f351a107cc70cb0d561883b054660e615bd718dfdd40f46fcca0
-
SSDEEP
12288:ozSggsivdusjuJXSs9NAaxsF2XxrAVyhtKKsv/GPBsf61QPH:ozC8hJXjyvVIKoBsf6G
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-