General
-
Target
7066fcfced087dd4216fedc8a76957eed3d1ddfca059d735e931868d29f29511
-
Size
535KB
-
Sample
250130-vadmxsypdm
-
MD5
f78f3d7bebf09e34f58c07c9670be39c
-
SHA1
4a53985ec8c627420dcd3d1689ac19d092942634
-
SHA256
7066fcfced087dd4216fedc8a76957eed3d1ddfca059d735e931868d29f29511
-
SHA512
0fd41f9ab416463a6a9aee9e8b2fd10b9ff7a5ea82ddcbd9f54d6a21f27b1a14500eabe26ee8aaa8b7d4e243451ed43254ab679697612b4c6871e9a7d9a29567
-
SSDEEP
12288:P6iXwHyBWuBAqGoIec4RZcJVFpMcS9SN/3tlmtWI1mm:PNwSBWuBAiZcRpMpu3Oum
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order (2).exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Leternel01@
Targets
-
-
Target
Purchase Order (2).exe
-
Size
618KB
-
MD5
d3b15e236df60a0e551bf21a26718250
-
SHA1
66626b523351b325c5d58569ec29d6a197698345
-
SHA256
dbc06aa2f5d8c73c079f19b7799691da6109b3a2afa2ea066c90afbab963acc2
-
SHA512
c4727719c3ec92599e6b0db89c197d102bccc1600c67089ec01bdf3cf1b075b79154febb29b69ac5303495f0859353a527a8583aee5e4ede8e217529e2b4c6b1
-
SSDEEP
6144:5o5JyDt117h5r2V96LUAqGMkMaAxfdXLJHOoOyX9nK6OyJvW/SNRaOlmDD9LGwYd:5RGGUAqGmJd9n1OyJOKtlm9pYr+0
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-