General
-
Target
rflBPCMj1cyYzdo.exe
-
Size
543KB
-
Sample
201117-4exwnwekjn
-
MD5
471991a919b20cf3144b283fd58fb7aa
-
SHA1
d3f8e3937a7b750176c363a0ef612deb6b5b7294
-
SHA256
0c057157ad65ebd8e9fc9ace3fcd42d5692f8ba1854107bfb131595417178ebc
-
SHA512
81aa64c6ebefe02e282579c58e2b37492241c9970497a89dfef90ef581afeb8aff63c100eab940ba76e2574fb5dd69dd96b94534a863ee220c487c01db65bac4
Static task
static1
Behavioral task
behavioral1
Sample
rflBPCMj1cyYzdo.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
rflBPCMj1cyYzdo.exe
Resource
win10v20201028
Malware Config
Extracted
Protocol: ftp- Host:
167.88.170.103 - Port:
21 - Username:
[email protected] - Password:
b6uFZQgo
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://167.88.170.103/ - Port:
21 - Username:
[email protected] - Password:
b6uFZQgo
Targets
-
-
Target
rflBPCMj1cyYzdo.exe
-
Size
543KB
-
MD5
471991a919b20cf3144b283fd58fb7aa
-
SHA1
d3f8e3937a7b750176c363a0ef612deb6b5b7294
-
SHA256
0c057157ad65ebd8e9fc9ace3fcd42d5692f8ba1854107bfb131595417178ebc
-
SHA512
81aa64c6ebefe02e282579c58e2b37492241c9970497a89dfef90ef581afeb8aff63c100eab940ba76e2574fb5dd69dd96b94534a863ee220c487c01db65bac4
Score10/10-
Snake Keylogger Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-