General
-
Target
J260-58AN-SL.cab
-
Size
146KB
-
Sample
210416-yt8gq2bw2j
-
MD5
74fd04ce908d0a2b9aa0badaa1902b17
-
SHA1
67283e7d7d8be3cc654ed4f77b34f4eb7908421f
-
SHA256
224c792de6b7462d961a8d7f2786c48f9109d7982fc461bee357f674133f4e3e
-
SHA512
709bde9d6579f84043284997400feb257b57d2b8c76b399a99f23043313c0ca1e8c804b0d97e199f2ffe96740f88fe1f2b0aca2cf7edaa2b46bc9e4e961a536b
Static task
static1
Behavioral task
behavioral1
Sample
J260-58AN-SL.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
J260-58AN-SL.exe
Resource
win10v20210410
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.cleo2solutions.com.au - Port:
587 - Username:
[email protected] - Password:
Enter@222
Targets
-
-
Target
J260-58AN-SL.exe
-
Size
174KB
-
MD5
02bc47c7ec341569bcab22ec8838303d
-
SHA1
8ff30e15b22782fd6ccd4f88c2aa39668bd176e2
-
SHA256
25689184412e0692e5fac0743d49a6c8c568a77edf18992ae070f44554c8547b
-
SHA512
3ea5b4fcef6455c1c2a83d9921a8b5e01bd43c2d8e7995e8057fa2e197a5d9d38df73aa2251954196225c6fbc2cacc863fac260b54f9d8c15d6dd2124ab6f4a9
Score10/10-
Snake Keylogger Payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-