General
-
Target
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe
-
Size
746KB
-
Sample
250130-dey1zsvqhq
-
MD5
144602f926387c40adf4be23409ad855
-
SHA1
b0611b6ecc6659373a16616af5907244c7e0adfa
-
SHA256
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef
-
SHA512
b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82
-
SSDEEP
12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz
Static task
static1
Behavioral task
behavioral1
Sample
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.saleo-gomel.by - Port:
587 - Username:
[email protected] - Password:
Q_gidroadmin_2014
Targets
-
-
Target
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe
-
Size
746KB
-
MD5
144602f926387c40adf4be23409ad855
-
SHA1
b0611b6ecc6659373a16616af5907244c7e0adfa
-
SHA256
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef
-
SHA512
b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82
-
SSDEEP
12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-