General
-
Target
a78cd90c7038b5fbeb10b972492b762a.exe
-
Size
144KB
-
Sample
230921-qz9dnsac73
-
MD5
a78cd90c7038b5fbeb10b972492b762a
-
SHA1
d9a1d4b511c824971d91ab7ebfe85688254caedc
-
SHA256
b82242cf60b9f23d227f5dda48fd1e959dbc0a0bd06bccb279ff3531783873ec
-
SHA512
6b6ef7d05ece99b7adbe3d2bcd53d3061280dcbd5e2c3d21590145b8963447727e7957f07d7613fbbb0b0e28a3bc3902fb2b49e2a79930bda92937435f07c637
-
SSDEEP
1536:ukBjbbGvhhbKCGM3bwa+vBUFMlY6vE9xTUl/1kvzMFZkamc5Eib/zJx3YPeZpiOu:7BjbKqPM3bivETitb7J+WbwBgxmgbY
Behavioral task
behavioral1
Sample
a78cd90c7038b5fbeb10b972492b762a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a78cd90c7038b5fbeb10b972492b762a.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.xantara.com.my - Port:
587 - Username:
[email protected] - Password:
Limetree342983! - Email To:
[email protected]
Targets
-
-
Target
a78cd90c7038b5fbeb10b972492b762a.exe
-
Size
144KB
-
MD5
a78cd90c7038b5fbeb10b972492b762a
-
SHA1
d9a1d4b511c824971d91ab7ebfe85688254caedc
-
SHA256
b82242cf60b9f23d227f5dda48fd1e959dbc0a0bd06bccb279ff3531783873ec
-
SHA512
6b6ef7d05ece99b7adbe3d2bcd53d3061280dcbd5e2c3d21590145b8963447727e7957f07d7613fbbb0b0e28a3bc3902fb2b49e2a79930bda92937435f07c637
-
SSDEEP
1536:ukBjbbGvhhbKCGM3bwa+vBUFMlY6vE9xTUl/1kvzMFZkamc5Eib/zJx3YPeZpiOu:7BjbKqPM3bivETitb7J+WbwBgxmgbY
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-