General
-
Target
02022025_1236_Inquiry IP250009 AF2506595_pdf .scr.iso
-
Size
90KB
-
Sample
250202-pszp8a1qht
-
MD5
0be00e4ad3ceaa683cf8ea3dfbbb9068
-
SHA1
da4fd004e85104086dc2a5a7c1f7313b79ee15b2
-
SHA256
30c4337662cb4e4f3a850b22075a4354642552c136839a2282139d3e20ad59bc
-
SHA512
4edda3df6d9a3caca10b3c9b9a70112d72b5de0a06d41124c8d7e2e5f3d9ee704665af134724469026a900dee51d17016db0a3314f054995ca894fb3b171aaec
-
SSDEEP
768:RFEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:zEtDBZdqLcNgcYYTbBykr
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry IP250009 AF2506595_pdf .scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Inquiry IP250009 AF2506595_pdf .scr
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.haselayakkabi.com.tr - Port:
25 - Username:
[email protected] - Password:
Ydj5DCO% - Email To:
[email protected]
Targets
-
-
Target
Inquiry IP250009 AF2506595_pdf .scr
-
Size
30KB
-
MD5
0e5971e91dd1db9deb1fb0423dfb7f86
-
SHA1
77550fc14cc113302e033b388af34e325b3cffa3
-
SHA256
9a46f9b65992fa05b30ff12b672bcc3c2bb9eb4a1ed3b18c41ab00912fa1ffef
-
SHA512
6aa1fc7cf57c872dbb5b2c6afc42cebb5c6acad1f8c9c939690529c931c780eb6b13e0a0ac4dce90c2b6a325334b3dbf2b7273564379c8eb5d4a9a2ad20f0e55
-
SSDEEP
768:zEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:zEtDBZdqLcNgcYYTbBykr
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-