General
-
Target
2fa09ee57bb2b3072c552ac43e07870c16872501131dc2dcd366cbcb30eed59a.exe
-
Size
73KB
-
Sample
211019-ne6qyagfck
-
MD5
3ef467dd6df7893cd2da5cb41e5e1693
-
SHA1
813bc7706d0c67bc50ca78f296ddfabcba9b31b3
-
SHA256
2fa09ee57bb2b3072c552ac43e07870c16872501131dc2dcd366cbcb30eed59a
-
SHA512
d64da5a86bf72c07cb97000c82d00ff471b7dd8d8b493f274d21eecadd6c8c63d49f4d18eee785077034684db6734c424312e96e237599defc639f14091bd77c
Static task
static1
Behavioral task
behavioral1
Sample
2fa09ee57bb2b3072c552ac43e07870c16872501131dc2dcd366cbcb30eed59a.exe
Resource
win10-de-20210920
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.enmmakina.com.tr - Port:
587 - Username:
[email protected] - Password:
WG7sfIIm5
Targets
-
-
Target
2fa09ee57bb2b3072c552ac43e07870c16872501131dc2dcd366cbcb30eed59a.exe
-
Size
73KB
-
MD5
3ef467dd6df7893cd2da5cb41e5e1693
-
SHA1
813bc7706d0c67bc50ca78f296ddfabcba9b31b3
-
SHA256
2fa09ee57bb2b3072c552ac43e07870c16872501131dc2dcd366cbcb30eed59a
-
SHA512
d64da5a86bf72c07cb97000c82d00ff471b7dd8d8b493f274d21eecadd6c8c63d49f4d18eee785077034684db6734c424312e96e237599defc639f14091bd77c
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-