General
-
Target
31012025_0108_sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe.iso
-
Size
88KB
-
Sample
250131-bhk77awre1
-
MD5
c9bdc515a5f1086d287d93cc66fd8464
-
SHA1
77033aa1c89117930e2d1bb80057ce8772ebe62c
-
SHA256
f3c346a9367baf1b29a9ea94bb847b180276869df8060ed57ede720592df11a0
-
SHA512
370cb22c9ffad653f9590cf6936c32722e3f4e323a0bc46eaa6b9398bf2535649f05bea3cca0b6708d57011e1b2aa020ba0532c4b31de1f2dae08c6871747430
-
SSDEEP
384:GgajLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:GhHvSPo8gBoV09GW6GAcKxX+
Static task
static1
Behavioral task
behavioral1
Sample
sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtps.aruba.it - Port:
465 - Username:
[email protected] - Password:
tecninf2017 - Email To:
[email protected]
Targets
-
-
Target
sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe
-
Size
26KB
-
MD5
c4b6e9359dac142bc8669819f9bf6092
-
SHA1
32e7b0d35ddc72c5781825d303941d5ea17ae828
-
SHA256
96a7766f5d19b90a2818078ea5d88c40dfa121fd812216cf5cba3b48e0708b79
-
SHA512
ffc1648f771e4af44dd0327084b301036503c7c5d4f0929b543ed6588a7ff0597e5f6d49f03edea8458ba301f9d6b4f155b7a8de75fb1cf5e410369c51394f97
-
SSDEEP
384:LjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:LHvSPo8gBoV09GW6GAcKxX+
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-