General
-
Target
xoTrmJx7i6t8dy9.exe
-
Size
573KB
-
Sample
201119-vcjntwvr8a
-
MD5
51fd98c3d315f959249a13de6f2b7960
-
SHA1
3f9bfd3af0ac8868b19b1337b89ede5a2afbaba3
-
SHA256
ed18bf204914e704fe7d77312b00b654d329666334abaf7bd3af546bad9dc4a6
-
SHA512
db3c05302eb380a4b0717c19753a73d3a056870179b8df233ff95f0ab83cb1ffa0a01c677d414d3113cc4475270fbf54dcc7e080fd2d8684313427a351bc934a
Static task
static1
Behavioral task
behavioral1
Sample
xoTrmJx7i6t8dy9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
xoTrmJx7i6t8dy9.exe
Resource
win10v20201028
Malware Config
Extracted
Protocol: ftp- Host:
orisinlog.com - Port:
21 - Username:
[email protected] - Password:
fENCThl=g{Ft
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://orisinlog.com/ - Port:
21 - Username:
[email protected] - Password:
fENCThl=g{Ft
Targets
-
-
Target
xoTrmJx7i6t8dy9.exe
-
Size
573KB
-
MD5
51fd98c3d315f959249a13de6f2b7960
-
SHA1
3f9bfd3af0ac8868b19b1337b89ede5a2afbaba3
-
SHA256
ed18bf204914e704fe7d77312b00b654d329666334abaf7bd3af546bad9dc4a6
-
SHA512
db3c05302eb380a4b0717c19753a73d3a056870179b8df233ff95f0ab83cb1ffa0a01c677d414d3113cc4475270fbf54dcc7e080fd2d8684313427a351bc934a
Score10/10-
Snake Keylogger Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-