General
-
Target
Image PDF.exe
-
Size
189KB
-
Sample
230530-hn73gafh72
-
MD5
fcd532931cbee93b33fec3b865847411
-
SHA1
5b59b18fbc8218cb554e90af2449757d90aa116a
-
SHA256
3b026f6a862b24e645a4696c79169960332752e2aa15d92081d9c101062f1c7f
-
SHA512
ca9125c4dcb89842add947d505e77780d5ec2660d90a5a5ccaf1b9d6c8e3e4984734be423670bd06e68dde7f7f2d0ba1246adcf8f072b4f8d025b732e0a1e70c
-
SSDEEP
3072:oqbtYfYoWAvduC9hVWYiEVcPAMFP0+SbzdEgFqFRJ4H2M/dOxdJz9ry1K7pGIR9l:obzWkd9hV/GJ6+2l/oNzwd
Static task
static1
Behavioral task
behavioral1
Sample
Image PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Image PDF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.idiomartcuenca.com - Port:
25 - Username:
[email protected] - Password:
@idiomARTcuenca! - Email To:
[email protected]
Targets
-
-
Target
Image PDF.exe
-
Size
189KB
-
MD5
fcd532931cbee93b33fec3b865847411
-
SHA1
5b59b18fbc8218cb554e90af2449757d90aa116a
-
SHA256
3b026f6a862b24e645a4696c79169960332752e2aa15d92081d9c101062f1c7f
-
SHA512
ca9125c4dcb89842add947d505e77780d5ec2660d90a5a5ccaf1b9d6c8e3e4984734be423670bd06e68dde7f7f2d0ba1246adcf8f072b4f8d025b732e0a1e70c
-
SSDEEP
3072:oqbtYfYoWAvduC9hVWYiEVcPAMFP0+SbzdEgFqFRJ4H2M/dOxdJz9ry1K7pGIR9l:obzWkd9hV/GJ6+2l/oNzwd
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-