General
-
Target
31012025_0818_30012025_FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.img
-
Size
88KB
-
Sample
250131-j7bdaasncp
-
MD5
669b3179120601e9d9b7acfa0cb99756
-
SHA1
aed46f29462179cb05a74a2d484f95ed1c1cf444
-
SHA256
4c577d699400716fdafd50da035d7179bde0a6e0f5d99a881a258f7930395122
-
SHA512
908b245c7692cd10ed4808d64bdb44fa7edbecebcd7a81d4db5359d7e0fdf832418c4b0da88a45b459d225dbeb971a90bcb251b2b0ee990565be6d7449b5017a
-
SSDEEP
384:GnwjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:GwHvSPo8gBoV09GW6GAcKxX+
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtps.aruba.it - Port:
465 - Username:
[email protected] - Password:
tecninf2017 - Email To:
[email protected]
Targets
-
-
Target
FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.exe
-
Size
26KB
-
MD5
c4b6e9359dac142bc8669819f9bf6092
-
SHA1
32e7b0d35ddc72c5781825d303941d5ea17ae828
-
SHA256
96a7766f5d19b90a2818078ea5d88c40dfa121fd812216cf5cba3b48e0708b79
-
SHA512
ffc1648f771e4af44dd0327084b301036503c7c5d4f0929b543ed6588a7ff0597e5f6d49f03edea8458ba301f9d6b4f155b7a8de75fb1cf5e410369c51394f97
-
SSDEEP
384:LjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:LHvSPo8gBoV09GW6GAcKxX+
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-