General
-
Target
StubV4.exe
-
Size
121KB
-
Sample
210607-8m6qyqvppj
-
MD5
b28520a52116f6d4aff843821f12def0
-
SHA1
ce4c528523eefd7feea36a878d7870965834baec
-
SHA256
24d1536cab85c5b987c854fa774c874137d43f310045c41de9a41a0abd042264
-
SHA512
8d1c227a1e99570a7206ed490b6eda6b2780efc0595c9fce8266e3ccbf73ec85584efe763457f670c5c7e497b236efb2ddac75fd1823fa5fd3aeec81158a344e
Static task
static1
Behavioral task
behavioral1
Sample
StubV4.exe
Resource
win7v20210410
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
465 - Username:
[email protected] - Password:
Qwerty2020Hp##
https://api.telegram.org/bot1487657528:AAFnNHLAtj_ujed9_IjvpSguj8z_a4GKbog/sendMessage?chat_id=1443320838
Targets
-
-
Target
StubV4.exe
-
Size
121KB
-
MD5
b28520a52116f6d4aff843821f12def0
-
SHA1
ce4c528523eefd7feea36a878d7870965834baec
-
SHA256
24d1536cab85c5b987c854fa774c874137d43f310045c41de9a41a0abd042264
-
SHA512
8d1c227a1e99570a7206ed490b6eda6b2780efc0595c9fce8266e3ccbf73ec85584efe763457f670c5c7e497b236efb2ddac75fd1823fa5fd3aeec81158a344e
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-