General
-
Target
74c5818c3bd47327115ed35e54e29b39b513b96335da5907edab19871bc543a4.zip
-
Size
558KB
-
Sample
250130-dsa63sxkdx
-
MD5
52e415891c8f97e078fcaacad5ec8bf2
-
SHA1
fda798518d5e69422a179920613ca572ece8c4c7
-
SHA256
74c5818c3bd47327115ed35e54e29b39b513b96335da5907edab19871bc543a4
-
SHA512
416dfb906fc6f7a0948c9c77c2ffe538662bbe68ed8601283198b789f2c5882202f96749826f347c5f4c1abc77511a9351dd0ea4e540b44b4a89a936f7afccb7
-
SSDEEP
12288:VkmDotxpuHBww+jiMklr0jOeG3tRj7b/ZE0nfaSNATFkUIl3+AB:m6otLiCizr08rnST4tB
Static task
static1
Behavioral task
behavioral1
Sample
Order Specification.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Order Specification.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.saleo-gomel.by - Port:
587 - Username:
[email protected] - Password:
Q_gidroadmin_2014
Targets
-
-
Target
Order Specification.exe
-
Size
746KB
-
MD5
144602f926387c40adf4be23409ad855
-
SHA1
b0611b6ecc6659373a16616af5907244c7e0adfa
-
SHA256
12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef
-
SHA512
b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82
-
SSDEEP
12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-