General
-
Target
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
-
Size
959KB
-
Sample
240703-rseq6asgjg
-
MD5
d662387f9f11b665b70d14c19177b058
-
SHA1
3aa3745a01043cecec79b49a29cdfff60265d519
-
SHA256
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626
-
SHA512
3bea71cee5f1a9bb94b9b01d3394b18a4a6a1b3e3e267f3fb11d3a9fe418364294fd906043031a64f6017a6e8f8dd5dfc85a11588209dda668fc8517d47c3508
-
SSDEEP
12288:o+WbFkpXD7n1FDoPNUCobwMtFTUhqxDd1XK8:o+4i3nnDAUCobwQ3h1V
Static task
static1
Behavioral task
behavioral1
Sample
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
i~~Ga+6_-~V*
Targets
-
-
Target
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe
-
Size
959KB
-
MD5
d662387f9f11b665b70d14c19177b058
-
SHA1
3aa3745a01043cecec79b49a29cdfff60265d519
-
SHA256
ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626
-
SHA512
3bea71cee5f1a9bb94b9b01d3394b18a4a6a1b3e3e267f3fb11d3a9fe418364294fd906043031a64f6017a6e8f8dd5dfc85a11588209dda668fc8517d47c3508
-
SSDEEP
12288:o+WbFkpXD7n1FDoPNUCobwMtFTUhqxDd1XK8:o+4i3nnDAUCobwQ3h1V
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-