General
-
Target
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe
-
Size
721KB
-
Sample
250219-fmtgkszkx8
-
MD5
374d59efbbcb915e8d203c9e528b6433
-
SHA1
cd3bafde9c87aeb297f6acf70b535884ffc25314
-
SHA256
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23
-
SHA512
baf4a2aea2c65e0579cc681f5488b0287df560ab9009c25e5bfefda7aa650108663351f4e00a6994d908d50e80da8cb8a2a46bd0751c3e83218cacd0779f639e
-
SSDEEP
12288:Sry/qKCniM75YDTDMsFdq3prA1NXT7w3F+N5NGv1vgIJ6ICjUj4OYAkQXlHDXxSf:PMedGpGNXoV+KgIJ6Aj4OYeXl
Static task
static1
Behavioral task
behavioral1
Sample
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.internationaluniforms.com - Port:
587 - Username:
[email protected] - Password:
New2022! - Email To:
[email protected]
Targets
-
-
Target
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe
-
Size
721KB
-
MD5
374d59efbbcb915e8d203c9e528b6433
-
SHA1
cd3bafde9c87aeb297f6acf70b535884ffc25314
-
SHA256
9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23
-
SHA512
baf4a2aea2c65e0579cc681f5488b0287df560ab9009c25e5bfefda7aa650108663351f4e00a6994d908d50e80da8cb8a2a46bd0751c3e83218cacd0779f639e
-
SSDEEP
12288:Sry/qKCniM75YDTDMsFdq3prA1NXT7w3F+N5NGv1vgIJ6ICjUj4OYAkQXlHDXxSf:PMedGpGNXoV+KgIJ6Aj4OYeXl
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-