General
-
Target
0x003f00000000f609-25.dat
-
Size
126KB
-
Sample
230928-1hatwsee7v
-
MD5
7fe292bc5ea2ef1ec95fbe7c4283b69b
-
SHA1
1b4ac2a792855b53db41b4280c4f41f60895a41d
-
SHA256
fe5c1d889311a86b8c0c29a8585acaf79bef3a03c3db746e582dc21ddda60a07
-
SHA512
e0d753ed326fb33af00e301f05bc943fe072162b37964be965f19d5181de0775e11bca5c637b62a1c6db0b94366dc07967faee2d536afca5640994f21f12544c
-
SSDEEP
3072:1ALhE1U1mv5C425pNyuN2b7GSAwBlTxfgbY:jch+Jbzx4b
Behavioral task
behavioral1
Sample
0x003f00000000f609-25.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0x003f00000000f609-25.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.product-secured.com/ - Port:
21 - Username:
[email protected] - Password:
575K5(MaZro2575K5(MaZro2
Extracted
Protocol: ftp- Host:
ftp.product-secured.com - Port:
21 - Username:
[email protected] - Password:
575K5(MaZro2575K5(MaZro2
Targets
-
-
Target
0x003f00000000f609-25.dat
-
Size
126KB
-
MD5
7fe292bc5ea2ef1ec95fbe7c4283b69b
-
SHA1
1b4ac2a792855b53db41b4280c4f41f60895a41d
-
SHA256
fe5c1d889311a86b8c0c29a8585acaf79bef3a03c3db746e582dc21ddda60a07
-
SHA512
e0d753ed326fb33af00e301f05bc943fe072162b37964be965f19d5181de0775e11bca5c637b62a1c6db0b94366dc07967faee2d536afca5640994f21f12544c
-
SSDEEP
3072:1ALhE1U1mv5C425pNyuN2b7GSAwBlTxfgbY:jch+Jbzx4b
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-