General
-
Target
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe
-
Size
520KB
-
Sample
240704-ckpttsyfkq
-
MD5
87c41e117d5bf575fc5bd9dd9386e2aa
-
SHA1
1ab94afc06ca89c564f43141281051aae9494086
-
SHA256
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7
-
SHA512
16c43e53f8d613d18bea8470917f023618d86bde991d175434fd2171f025dfea33901faca8e2667379e81a318cc1db29637bd9880192607d5fea860e3afa29a3
-
SSDEEP
6144:sTVFZInd6Xcfg9UZndhc7KFCEBbDlRPBUYLvyvvRFBZrrfXB0JaTc0ApziCbI:s5kndmHuxV/JUJDBZrSJaTopzi8I
Static task
static1
Behavioral task
behavioral1
Sample
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.valleycountysar.org - Port:
587 - Username:
[email protected] - Password:
DKw(r0%wpbd]
http://103.130.147.85
Targets
-
-
Target
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe
-
Size
520KB
-
MD5
87c41e117d5bf575fc5bd9dd9386e2aa
-
SHA1
1ab94afc06ca89c564f43141281051aae9494086
-
SHA256
e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7
-
SHA512
16c43e53f8d613d18bea8470917f023618d86bde991d175434fd2171f025dfea33901faca8e2667379e81a318cc1db29637bd9880192607d5fea860e3afa29a3
-
SSDEEP
6144:sTVFZInd6Xcfg9UZndhc7KFCEBbDlRPBUYLvyvvRFBZrrfXB0JaTc0ApziCbI:s5kndmHuxV/JUJDBZrSJaTopzi8I
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-