General
-
Target
MT Marine Tiger.exe
-
Size
482KB
-
Sample
240629-e1c63stfln
-
MD5
9aaf0e13931abe17c27dd943b5835937
-
SHA1
8db76fa143b6e967cc9fe9b9ed441291ca055009
-
SHA256
16335a1172a838611368645dab4446c79b750e3159a6d9f95556d420c559f469
-
SHA512
05c9a9ba679f7155208c8928d45797c80c301eb46f3670c30759077ccd5edd6a82798bcb2eea325ab598197c4320277294af9ee51a01ac872755bcf206abdd23
-
SSDEEP
6144:wXuAPKbX9sDEXfmgVvUKm0RfeFdDcyfXZXTraIyErhT41fG5QDGiu/byyvDuBRgC:wXuBqDEvmYfsDcyfpXpTh5qDGiEv6BC
Static task
static1
Behavioral task
behavioral1
Sample
MT Marine Tiger.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MT Marine Tiger.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
fY,FLoadtsiF
Targets
-
-
Target
MT Marine Tiger.exe
-
Size
482KB
-
MD5
9aaf0e13931abe17c27dd943b5835937
-
SHA1
8db76fa143b6e967cc9fe9b9ed441291ca055009
-
SHA256
16335a1172a838611368645dab4446c79b750e3159a6d9f95556d420c559f469
-
SHA512
05c9a9ba679f7155208c8928d45797c80c301eb46f3670c30759077ccd5edd6a82798bcb2eea325ab598197c4320277294af9ee51a01ac872755bcf206abdd23
-
SSDEEP
6144:wXuAPKbX9sDEXfmgVvUKm0RfeFdDcyfXZXTraIyErhT41fG5QDGiu/byyvDuBRgC:wXuBqDEvmYfsDcyfpXpTh5qDGiEv6BC
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-