General
-
Target
03722f26ce3091fb4972b9ac4a62e6dbd780d7a2685554ada8668ae7f79efa47
-
Size
327KB
-
Sample
220113-r586jaahe2
-
MD5
207024dc37adad4daedbc9768941d70f
-
SHA1
45df94df32714e5232601da5873abe49d498deae
-
SHA256
03722f26ce3091fb4972b9ac4a62e6dbd780d7a2685554ada8668ae7f79efa47
-
SHA512
fcdf8575cb5952eba0cee15b6ec13a2fc4912f39e32d02a09716979261bbb8f8c05a3385df16cf16cf3a780004c11ca7d9040473b351b6a6ec108ca0a7d6ad6a
Static task
static1
Behavioral task
behavioral1
Sample
03722f26ce3091fb4972b9ac4a62e6dbd780d7a2685554ada8668ae7f79efa47.exe
Resource
win10-en-20211208
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
s1.20mb.nl - Port:
587 - Username:
[email protected] - Password:
Blessedones3459
https://api.telegram.org/bot5091312455:AAFYg4PIP6N-Z1HEmI3j938-6ByGG0MqTC8/sendMessage?chat_id=5080369280
Targets
-
-
Target
03722f26ce3091fb4972b9ac4a62e6dbd780d7a2685554ada8668ae7f79efa47
-
Size
327KB
-
MD5
207024dc37adad4daedbc9768941d70f
-
SHA1
45df94df32714e5232601da5873abe49d498deae
-
SHA256
03722f26ce3091fb4972b9ac4a62e6dbd780d7a2685554ada8668ae7f79efa47
-
SHA512
fcdf8575cb5952eba0cee15b6ec13a2fc4912f39e32d02a09716979261bbb8f8c05a3385df16cf16cf3a780004c11ca7d9040473b351b6a6ec108ca0a7d6ad6a
Score10/10-
Snake Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-