General
-
Target
PROOF OF PAYMENT.exe
-
Size
142KB
-
Sample
231027-sdvz9sfb7x
-
MD5
3add120023b59ee143e4385644fb120f
-
SHA1
71f7a289477836ce8789bbb2749e9be4acfaf57f
-
SHA256
f7d51906ee99dd4f0b4f213c716c071e6d3f66be799b77128e8567c7749a1a05
-
SHA512
1216d4be766858798e392b18e58046382e66eaba288b5404e1bae5cd8b558370a58d0d1ff2b6d15dec0bc110bec4da857cf0c612afcf62e2544a06d12a8cc9e5
-
SSDEEP
3072:FhryR6+DP/CUqrEu9fygubH579wBPpxe1guO2z6t2ebY:G+NubZ0pcgY6rb
Behavioral task
behavioral1
Sample
PROOF OF PAYMENT.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PROOF OF PAYMENT.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.pacific.co.za - Port:
587 - Username:
[email protected] - Password:
G@reth#M1tchell - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pacific.co.za - Port:
587 - Username:
[email protected] - Password:
G@reth#M1tchell
Targets
-
-
Target
PROOF OF PAYMENT.exe
-
Size
142KB
-
MD5
3add120023b59ee143e4385644fb120f
-
SHA1
71f7a289477836ce8789bbb2749e9be4acfaf57f
-
SHA256
f7d51906ee99dd4f0b4f213c716c071e6d3f66be799b77128e8567c7749a1a05
-
SHA512
1216d4be766858798e392b18e58046382e66eaba288b5404e1bae5cd8b558370a58d0d1ff2b6d15dec0bc110bec4da857cf0c612afcf62e2544a06d12a8cc9e5
-
SSDEEP
3072:FhryR6+DP/CUqrEu9fygubH579wBPpxe1guO2z6t2ebY:G+NubZ0pcgY6rb
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-