General
-
Target
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
Size
127KB
-
Sample
221225-pe1qcsef3t
-
MD5
c193b51e0fff10d76d6f94dc1fc50f14
-
SHA1
fe05e48e25033f42bc91ae47901d4db7f208e32c
-
SHA256
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
SHA512
d46595c45ef8ead535b8d69e1950ae22064e498f89e8f40755bc50aca6e660807f066e548e33496b3499465260cc6fc326fe3bcc5cfdcb623f2fa64e5504aa29
-
SSDEEP
1536:J5H8taABwPDvKtcf+Ce+vBUFrlYYeakHcYCcCWPQZcMFXCccb/UffIxDpiOWBI83:J5H8Y0UHf+beaHcb8HIxtwBI8mFbY
Behavioral task
behavioral1
Sample
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
universaleagles-ye.com - Port:
587 - Username:
[email protected] - Password:
UEss@@202122
Targets
-
-
Target
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
Size
127KB
-
MD5
c193b51e0fff10d76d6f94dc1fc50f14
-
SHA1
fe05e48e25033f42bc91ae47901d4db7f208e32c
-
SHA256
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
SHA512
d46595c45ef8ead535b8d69e1950ae22064e498f89e8f40755bc50aca6e660807f066e548e33496b3499465260cc6fc326fe3bcc5cfdcb623f2fa64e5504aa29
-
SSDEEP
1536:J5H8taABwPDvKtcf+Ce+vBUFrlYYeakHcYCcCWPQZcMFXCccb/UffIxDpiOWBI83:J5H8Y0UHf+beaHcb8HIxtwBI8mFbY
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-