General
-
Target
EagleAsia08appointmentletter.exe.v
-
Size
682KB
-
Sample
250131-esk7qazqdn
-
MD5
0d7cce35f88ab81372525702aef249a9
-
SHA1
046c8ca2470a0e71d817fca08ffaa5d9b31dfb70
-
SHA256
97d0510ca5b726fb79ce77ed97dc5096310bc8fda449bab20d15d7386826b057
-
SHA512
1493f0c9cc628a1f4927b088de5a6717391773346ac209cbdc323d659dc39fe2f9c8675dc63d9cc8676cf1c0084655dbeea2fc18810654dfb485884c8e533e0b
-
SSDEEP
12288:E6SUmph87hSLSKE7alDgV1Nx2tho3WcJeIuMpm8+ifhBlv/FJ:8zj8FSLfef/No7o3VJZRdzX
Static task
static1
Behavioral task
behavioral1
Sample
EagleAsia08appointmentletter.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
EagleAsia08appointmentletter.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.saleo-gomel.by - Port:
587 - Username:
[email protected] - Password:
Q_gidroadmin_2014
Targets
-
-
Target
EagleAsia08appointmentletter.exe.v
-
Size
682KB
-
MD5
0d7cce35f88ab81372525702aef249a9
-
SHA1
046c8ca2470a0e71d817fca08ffaa5d9b31dfb70
-
SHA256
97d0510ca5b726fb79ce77ed97dc5096310bc8fda449bab20d15d7386826b057
-
SHA512
1493f0c9cc628a1f4927b088de5a6717391773346ac209cbdc323d659dc39fe2f9c8675dc63d9cc8676cf1c0084655dbeea2fc18810654dfb485884c8e533e0b
-
SSDEEP
12288:E6SUmph87hSLSKE7alDgV1Nx2tho3WcJeIuMpm8+ifhBlv/FJ:8zj8FSLfef/No7o3VJZRdzX
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-