General
-
Target
1496-66-0x00000000002D0000-0x00000000002F6000-memory.dmp
-
Size
152KB
-
Sample
230215-s2e9qace68
-
MD5
8f70c72b7bcb3bad658e51c4ab4ccca4
-
SHA1
3e438a0fb7b17d1180ffb831ff9a66015ee7ef73
-
SHA256
a3bc6492c962bb40d8c9f93f2ef1f18642efdc07da134724394eb9fe978b2ffd
-
SHA512
02e76bb87bc402fc737b2608ffd3c5d0cf0774d68f1134ddaf0c2beec2995fc88812b93fa6fc25ddafa0d5d1ace3f20ffb75d654bff5b6ac478ce16e48b1315c
-
SSDEEP
1536:rAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFTSIKLVF/yab/UF:rAgAEzoHj/LDdLgBbb8BFbwBj2OFbY
Behavioral task
behavioral1
Sample
1496-66-0x00000000002D0000-0x00000000002F6000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1496-66-0x00000000002D0000-0x00000000002F6000-memory.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
1496-66-0x00000000002D0000-0x00000000002F6000-memory.dmp
-
Size
152KB
-
MD5
8f70c72b7bcb3bad658e51c4ab4ccca4
-
SHA1
3e438a0fb7b17d1180ffb831ff9a66015ee7ef73
-
SHA256
a3bc6492c962bb40d8c9f93f2ef1f18642efdc07da134724394eb9fe978b2ffd
-
SHA512
02e76bb87bc402fc737b2608ffd3c5d0cf0774d68f1134ddaf0c2beec2995fc88812b93fa6fc25ddafa0d5d1ace3f20ffb75d654bff5b6ac478ce16e48b1315c
-
SSDEEP
1536:rAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFTSIKLVF/yab/UF:rAgAEzoHj/LDdLgBbb8BFbwBj2OFbY
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-