General
-
Target
MV ANNA SCHULTE.exe
-
Size
537KB
-
Sample
240627-tkglws1fjl
-
MD5
53a0cf9bddd68eeb6c033b1aaae1c8ca
-
SHA1
770a37b59ebdd957838acd492f51ccad326bde31
-
SHA256
8b286acc0c7e75da6e19b216f8e6c19aa4662df039cbb364b712f7b8a55b0efd
-
SHA512
15b98af480b55d259dd31ec3f63cb7362f246c09179c481564706bef39a6f9d053b74aa3fbfc4c88c0a54fc9aa97582d04b29dbe623ba238c6c756dd8ae08831
-
SSDEEP
12288:/w+ftNJRRNic3g1tI3Fuyk3+Xanic2R/tJv/v+sLuSn:Y4t3NicQ1icerv/hLB
Static task
static1
Behavioral task
behavioral1
Sample
MV ANNA SCHULTE.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
MV ANNA SCHULTE.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.valleycountysar.org - Port:
587 - Username:
[email protected] - Password:
DKw(r0%wpbd]
http://103.130.147.85
Targets
-
-
Target
MV ANNA SCHULTE.exe
-
Size
537KB
-
MD5
53a0cf9bddd68eeb6c033b1aaae1c8ca
-
SHA1
770a37b59ebdd957838acd492f51ccad326bde31
-
SHA256
8b286acc0c7e75da6e19b216f8e6c19aa4662df039cbb364b712f7b8a55b0efd
-
SHA512
15b98af480b55d259dd31ec3f63cb7362f246c09179c481564706bef39a6f9d053b74aa3fbfc4c88c0a54fc9aa97582d04b29dbe623ba238c6c756dd8ae08831
-
SSDEEP
12288:/w+ftNJRRNic3g1tI3Fuyk3+Xanic2R/tJv/v+sLuSn:Y4t3NicQ1icerv/hLB
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-