General
-
Target
(ES2309-015).exe
-
Size
596KB
-
Sample
231012-pcg58she6t
-
MD5
cdfe23a08e0b9673367a3379bed3e92e
-
SHA1
e91914745caff7dac32d6659548068785e8b613f
-
SHA256
774848bbb254f80a0771e51ab42402c9f69c34593f875dfe436506089c595505
-
SHA512
fad52aa899c7fc86e76fe656fb15dba3297135f4f3cc7fc1132759765cac4847bc2feb1c0ec0663e6538bba8b855c97f8ac1672483d4712fd1cf83e3775119a3
-
SSDEEP
12288:8wFmyBfJw1UAADCXTFdhV97yFtQRl8Yr8bvste+a3ekfJ:L9BwluCXTFdhPktQP8YrYkUj3/B
Static task
static1
Behavioral task
behavioral1
Sample
(ES2309-015).exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
(ES2309-015).exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.nura.com.my - Port:
587 - Username:
[email protected] - Password:
jWAH^6m - Email To:
[email protected]
Targets
-
-
Target
(ES2309-015).exe
-
Size
596KB
-
MD5
cdfe23a08e0b9673367a3379bed3e92e
-
SHA1
e91914745caff7dac32d6659548068785e8b613f
-
SHA256
774848bbb254f80a0771e51ab42402c9f69c34593f875dfe436506089c595505
-
SHA512
fad52aa899c7fc86e76fe656fb15dba3297135f4f3cc7fc1132759765cac4847bc2feb1c0ec0663e6538bba8b855c97f8ac1672483d4712fd1cf83e3775119a3
-
SSDEEP
12288:8wFmyBfJw1UAADCXTFdhV97yFtQRl8Yr8bvste+a3ekfJ:L9BwluCXTFdhPktQP8YrYkUj3/B
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-