General
-
Target
tmp6hrwcjsj
-
Size
521KB
-
Sample
240626-xd19haxemg
-
MD5
8e6733fc8e95e3436dde66049d7bb9dc
-
SHA1
633af7a10f8f9ecacfe46082b2ac5937b17bf887
-
SHA256
30fbb8aefc25658953ec57ac7b5c6a974075fbbb4289df4267014b4f4c2c64a9
-
SHA512
f25b41d55ec93cefd78bbfe361e5fae7f33342dc9e4444d934bd5bbab38e148ac65bbd1795f6589fbac36dd1508c582d2f3a87bd763e852ba99a4dbacc0f1501
-
SSDEEP
12288:c5kndmzALYFXyk2VLY/YPYzYzY1YWk13PpylUPjrC6/:HngzNy9GmaO8PEx60X/
Static task
static1
Behavioral task
behavioral1
Sample
tmp6hrwcjsj.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
tmp6hrwcjsj.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
i~~Ga+6_-~V*
Targets
-
-
Target
tmp6hrwcjsj
-
Size
521KB
-
MD5
8e6733fc8e95e3436dde66049d7bb9dc
-
SHA1
633af7a10f8f9ecacfe46082b2ac5937b17bf887
-
SHA256
30fbb8aefc25658953ec57ac7b5c6a974075fbbb4289df4267014b4f4c2c64a9
-
SHA512
f25b41d55ec93cefd78bbfe361e5fae7f33342dc9e4444d934bd5bbab38e148ac65bbd1795f6589fbac36dd1508c582d2f3a87bd763e852ba99a4dbacc0f1501
-
SSDEEP
12288:c5kndmzALYFXyk2VLY/YPYzYzY1YWk13PpylUPjrC6/:HngzNy9GmaO8PEx60X/
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-