General
-
Target
26924709bded5d395fd3a6f44c2cd0cbaca595724da8e8965026e4459045c848
-
Size
606KB
-
Sample
250213-ljrfpswldp
-
MD5
d0e97c7751a40f7b34113b30d77ffdb6
-
SHA1
50bb07567a8065c132a845577ecbc60d97ea622d
-
SHA256
26924709bded5d395fd3a6f44c2cd0cbaca595724da8e8965026e4459045c848
-
SHA512
b9d1f5150db6dd33fea7d33ed44ae3bca937cafb10ca9a5fbb7dc9d3a70ebf74148a770070cf225d59fa2f8e26cac4ef5b23de8b8d4d9a2f0b5a09d6a7800ba4
-
SSDEEP
12288:CcgJchyQzgPV3zCvAnoPijvjw2MEMIhv/GwDNG5lMwSh:Cc0c0avFPmr/MmvTWRq
Static task
static1
Behavioral task
behavioral1
Sample
VkF80MC8Kd7Z5Bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VkF80MC8Kd7Z5Bd.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.aktagor-prom.by - Port:
587 - Username:
[email protected] - Password:
RC84pv9H2*F
Targets
-
-
Target
VkF80MC8Kd7Z5Bd.exe
-
Size
686KB
-
MD5
15a83d767191060be2ade250eb183cd0
-
SHA1
c61c7f82af922b45ac694edecaa824aed22bae00
-
SHA256
b0f20f8a79db9d246f9812607ca3fc0019fc6c7905ffaa333bc0587fb69a1e58
-
SHA512
16082aec6537f6a0930b83f3b08e88bcbd6b3a418656711d2a89edee6b1885141f044f173e776ce6de24c03bc9fc5294227fb293e0818c5b7f49d4dab8e9d7c3
-
SSDEEP
12288:5bAHH/DneK/bQPgPv3tQ78PoHiVtMYCGV/uwDP3e3iLmMx:5bKHzeKi7vHmtMapUiLXx
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2