General
-
Target
d756511151c525ba1a658e046e922e8a
-
Size
1.6MB
-
Sample
220211-x4yw3aeffp
-
MD5
d756511151c525ba1a658e046e922e8a
-
SHA1
b3b68c71c1286052cab24f8f245836dd410110fa
-
SHA256
4e17b5f9b4b0b5c568def305d3c73b997a0191684632912f43fcc89894ca6f2b
-
SHA512
316dcd2e8e677811305fd4313ee403abe10aaf2dcddb537e882aa327895a0fc69892ed3457a0e943031a7cb1f5cda5afa0a9df502eaaedff11bd779c1cccd158
Static task
static1
Behavioral task
behavioral1
Sample
d756511151c525ba1a658e046e922e8a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d756511151c525ba1a658e046e922e8a.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.gladiators44.xyz/ - Port:
21 - Username:
[email protected] - Password:
@Mexico1.,
Targets
-
-
Target
d756511151c525ba1a658e046e922e8a
-
Size
1.6MB
-
MD5
d756511151c525ba1a658e046e922e8a
-
SHA1
b3b68c71c1286052cab24f8f245836dd410110fa
-
SHA256
4e17b5f9b4b0b5c568def305d3c73b997a0191684632912f43fcc89894ca6f2b
-
SHA512
316dcd2e8e677811305fd4313ee403abe10aaf2dcddb537e882aa327895a0fc69892ed3457a0e943031a7cb1f5cda5afa0a9df502eaaedff11bd779c1cccd158
Score10/10-
Snake Keylogger Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-