General
-
Target
PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exe
-
Size
1.3MB
-
Sample
240625-hh2y9sycqr
-
MD5
f5ed37b7d5727d74362f546b52b2e95c
-
SHA1
15539f2e7a03bfaa4a503b56eed59c637f59a0b9
-
SHA256
d1216d92359365622cb8245efefcd5cdd5fdf1af7eab4b116c86ce85a8ddfc14
-
SHA512
450edbca06f8f47b9b7a7cb8d05869179e52e796c34ad10bb9943ee58569139f4ea86b36aad46d91801f791a3c5f3537d60546a98c4f4dfe9f87799ab6d72414
-
SSDEEP
24576:X2gM8IEExNLBFPMLO5FrRi9F/KWZ7f438j4gVEW:ExNLz0LwFrR3a
Static task
static1
Behavioral task
behavioral1
Sample
PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.efsmanpower.com - Port:
587 - Username:
[email protected] - Password:
Zion#2018 - Email To:
[email protected]
http://103.130.147.85
Targets
-
-
Target
PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exe
-
Size
1.3MB
-
MD5
f5ed37b7d5727d74362f546b52b2e95c
-
SHA1
15539f2e7a03bfaa4a503b56eed59c637f59a0b9
-
SHA256
d1216d92359365622cb8245efefcd5cdd5fdf1af7eab4b116c86ce85a8ddfc14
-
SHA512
450edbca06f8f47b9b7a7cb8d05869179e52e796c34ad10bb9943ee58569139f4ea86b36aad46d91801f791a3c5f3537d60546a98c4f4dfe9f87799ab6d72414
-
SSDEEP
24576:X2gM8IEExNLBFPMLO5FrRi9F/KWZ7f438j4gVEW:ExNLz0LwFrR3a
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-