General
-
Target
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b
-
Size
174KB
-
Sample
210416-yl4raz6j6n
-
MD5
02bc47c7ec341569bcab22ec8838303d
-
SHA1
8ff30e15b22782fd6ccd4f88c2aa39668bd176e2
-
SHA256
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b
-
SHA512
3ea5b4fcef6455c1c2a83d9921a8b5e01bd43c2d8e7995e8057fa2e197a5d9d38df73aa2251954196225c6fbc2cacc863fac260b54f9d8c15d6dd2124ab6f4a9
Static task
static1
Behavioral task
behavioral1
Sample
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b.exe
Resource
win10v20210410
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.cleo2solutions.com.au - Port:
587 - Username:
[email protected] - Password:
Enter@222
Targets
-
-
Target
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b
-
Size
174KB
-
MD5
02bc47c7ec341569bcab22ec8838303d
-
SHA1
8ff30e15b22782fd6ccd4f88c2aa39668bd176e2
-
SHA256
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b
-
SHA512
3ea5b4fcef6455c1c2a83d9921a8b5e01bd43c2d8e7995e8057fa2e197a5d9d38df73aa2251954196225c6fbc2cacc863fac260b54f9d8c15d6dd2124ab6f4a9
Score10/10-
Snake Keylogger Payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-